Impact
Shynet versions before 0.14.0 allow a host header injection during the password reset process. The application uses the value of the Host header to construct reset emails, enabling an attacker to supply a malicious host that causes reset links to point to a forged domain, potentially leading to credential theft or phishing.
Affected Systems
The affected product is Shynet from milesmcc. Any installation running a version older than 0.14.0 is vulnerable. The issue was fixed in release 0.14.0.
Risk and Exploitability
The severity is moderate. Exploitation probability is low, estimated below 1%. The flaw is not listed in the CISA KEV catalog. An attacker would need only to send a crafted request to the password reset endpoint from an external network, providing a malicious Host header value.
OpenCVE Enrichment