漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Talkyard - Host-Header Injection Leads to Account Takeover
Vulnerability Description
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Vulnerability Title
Talkyard 注入漏洞
Vulnerability Description
Talkyard是开源的一个结构化的讨论平台,汇集了 StackOverflow、Slack、Discourse、Reddit/HackerNews 和 Disqus 博客评论的主要功能。 Talkyard 存在安全漏洞,未经身份验证的攻击者可以使用forgot password功能重置受害者的密码并成功接管他们的帐户。以下产品及版本受到影响:Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e
CVSS Information
N/A
Vulnerability Type
N/A