A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords.
References
Link | Resource |
---|---|
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877 | Exploit Third Party Advisory |
https://github.com/gugoan/economizzer/ | Product |
https://www.economizzer.org | Product |
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877 | Exploit Third Party Advisory |
https://github.com/gugoan/economizzer/ | Product |
https://www.economizzer.org | Product |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-28 04:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38877
Mitre link : CVE-2023-38877
CVE.ORG link : CVE-2023-38877
JSON object : View
Products Affected
economizzer
- economizzer
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')