In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3452 | In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over. |
Github GHSA |
GHSA-9vh6-qfv6-vcqp | snipe-IT vulnerable to host header injection |
Fixes
Solution
Upgrade version to v5.3.8 or higher
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2024-09-16T22:39:57.099Z
Reserved: 2022-01-10T00:00:00
Link: CVE-2022-23064
No data.
Status : Modified
Published: 2022-05-02T13:15:08.170
Modified: 2024-11-21T06:47:54.833
Link: CVE-2022-23064
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA