The Security/changepassword URL action in SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 passes a token as a GET parameter while changing a password through email, which allows remote attackers to obtain sensitive data and hijack the session via the HTTP referer logs on a server, aka "HTTP referer leakage."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.3.10 - | |
References | () http://doc.silverstripe.org/sapphire/en/trunk/changelogs//2.4.4 - | |
References | () http://open.silverstripe.org/changeset/114758 - | |
References | () http://secunia.com/advisories/42346 - | |
References | () http://www.openwall.com/lists/oss-security/2011/01/03/12 - | |
References | () http://www.openwall.com/lists/oss-security/2012/04/30/1 - | |
References | () http://www.openwall.com/lists/oss-security/2012/04/30/3 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/01/3 - | |
References | () http://www.osvdb.org/69887 - |
Information
Published : 2012-08-26 18:55
Updated : 2024-11-21 01:22
NVD link : CVE-2010-5080
Mitre link : CVE-2010-5080
CVE.ORG link : CVE-2010-5080
JSON object : View
Products Affected
silverstripe
- silverstripe