Dotclear before 2.10.3, when the Host header is not part of the web server routing process, allows remote attackers to modify the password reset address link via the HTTP Host header.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/10/05/5 | Mailing List |
http://www.securityfocus.com/bid/93439 | |
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 | Patch Vendor Advisory |
https://hg.dotclear.org/dotclear/rev/bb06343f4247 | Patch |
http://www.openwall.com/lists/oss-security/2016/10/05/5 | Mailing List |
http://www.securityfocus.com/bid/93439 | |
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 | Patch Vendor Advisory |
https://hg.dotclear.org/dotclear/rev/bb06343f4247 | Patch |
Configurations
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/10/05/5 - Mailing List | |
References | () http://www.securityfocus.com/bid/93439 - | |
References | () https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 - Patch, Vendor Advisory | |
References | () https://hg.dotclear.org/dotclear/rev/bb06343f4247 - Patch |
Information
Published : 2017-01-04 21:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7903
Mitre link : CVE-2016-7903
CVE.ORG link : CVE-2016-7903
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-264
Permissions, Privileges, and Access Controls