CVE-2021-25980

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*
cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*
cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:55

Type Values Removed Values Added
References () https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289 - Patch, Third Party Advisory () https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289 - Patch, Third Party Advisory
References () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 - Third Party Advisory () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 - Third Party Advisory

Information

Published : 2021-11-11 07:15

Updated : 2024-11-21 05:55


NVD link : CVE-2021-25980

Mitre link : CVE-2021-25980

CVE.ORG link : CVE-2021-25980


JSON object : View

Products Affected

talkyard

  • talkyard
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')