A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords.
History

Mon, 26 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Trquoccuong
Trquoccuong arrow Cms
Weaknesses CWE-74
CPEs cpe:2.3:a:trquoccuong:arrow_cms:1.0.0:*:*:*:*:*:*:*
Vendors & Products Trquoccuong
Trquoccuong arrow Cms
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
Description A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-23T00:00:00

Updated: 2024-08-26T16:22:58.840Z

Reserved: 2024-08-05T00:00:00

Link: CVE-2024-42914

cve-icon Vulnrichment

Updated: 2024-08-26T16:22:52.462Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-23T19:15:07.010

Modified: 2024-08-26T17:35:10.510

Link: CVE-2024-42914

cve-icon Redhat

No data.