Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.

This issue affects Apache Answer: through 1.3.5.

User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2587 Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Github GHSA Github GHSA GHSA-gvpv-r32v-9737 Apache Answer: The link to reset the user's password will remain valid after sending a new link
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Thu, 29 Aug 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache answer
CPEs cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache answer
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Fri, 09 Aug 2024 16:15:00 +0000

Type Values Removed Values Added
References

Fri, 09 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Description Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Title Apache Answer: The link to reset the user's password will remain valid after sending a new link
Weaknesses CWE-772
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-03-13T18:27:24.551Z

Reserved: 2024-07-23T02:41:50.995Z

Link: CVE-2024-41890

cve-icon Vulnrichment

Updated: 2024-08-09T15:02:54.353Z

cve-icon NVD

Status : Modified

Published: 2024-08-12T13:38:31.733

Modified: 2025-03-13T19:15:47.500

Link: CVE-2024-41890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.