This issue affects Apache Answer: through 1.3.5.
User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2587 | Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue. |
Github GHSA |
GHSA-gvpv-r32v-9737 | Apache Answer: The link to reset the user's password will remain valid after sending a new link |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 29 Aug 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache answer |
|
| CPEs | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache answer |
|
| Metrics |
cvssV3_1
|
Fri, 09 Aug 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 09 Aug 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue. | |
| Title | Apache Answer: The link to reset the user's password will remain valid after sending a new link | |
| Weaknesses | CWE-772 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-13T18:27:24.551Z
Reserved: 2024-07-23T02:41:50.995Z
Link: CVE-2024-41890
Updated: 2024-08-09T15:02:54.353Z
Status : Modified
Published: 2024-08-12T13:38:31.733
Modified: 2025-03-13T19:15:47.500
Link: CVE-2024-41890
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA