A host header injection vulnerability in scheduleR v0.0.18 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
References
Link | Resource |
---|---|
https://github.com/soursec/CVEs/tree/main/CVE-2024-45982 |
Configurations
No configuration.
History
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-284 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
26 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 17:15
Updated : 2024-09-30 12:46
NVD link : CVE-2024-45982
Mitre link : CVE-2024-45982
CVE.ORG link : CVE-2024-45982
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control