HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
History

Tue, 06 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Haloservicesolutions
Haloservicesolutions haloitsm
CPEs cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*
Vendors & Products Haloservicesolutions
Haloservicesolutions haloitsm
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published: 2024-08-06T06:03:11.225Z

Updated: 2024-08-06T18:47:20.023Z

Reserved: 2024-06-20T13:13:30.214Z

Link: CVE-2024-6203

cve-icon Vulnrichment

Updated: 2024-08-06T18:46:52.262Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-06T06:15:35.727

Modified: 2024-08-29T17:46:28.790

Link: CVE-2024-6203

cve-icon Redhat

No data.