A host header injection vulnerability in scheduleR v0.0.18 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/soursec/CVEs/tree/main/CVE-2024-45982 |
History
Thu, 26 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Scheduler
Scheduler scheduler |
|
Weaknesses | CWE-284 | |
CPEs | cpe:2.3:a:scheduler:scheduler:0.0.18:*:*:*:*:*:*:* | |
Vendors & Products |
Scheduler
Scheduler scheduler |
|
Metrics |
cvssV3_1
|
Thu, 26 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A host header injection vulnerability in scheduleR v0.0.18 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-26T00:00:00
Updated: 2024-09-26T20:20:33.532Z
Reserved: 2024-09-11T00:00:00
Link: CVE-2024-45982
Vulnrichment
Updated: 2024-09-26T20:20:26.956Z
NVD
Status : Awaiting Analysis
Published: 2024-09-26T17:15:04.100
Modified: 2024-09-30T12:46:20.237
Link: CVE-2024-45982
Redhat
No data.