
Cloud Vulnerability DB
A community-led vulnerabilities database
Known v1.3.1+2020120201 was discovered to contain a host header injection vulnerability that allows attackers to perform an account takeover via password reset poisoning (NVD, Jitendra Blog).
The vulnerability exists in the password reset functionality where the application improperly validates the Host header in password reset requests. When processing password reset requests, the application accepts arbitrary Host headers which are then used to generate password reset links sent to users. The vulnerability has a CVSS v3.1 Base Score of 8.8 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) (NVD).
An attacker can exploit this vulnerability to take over user accounts by poisoning password reset links. When a user clicks on the manipulated password reset link, the token is sent to the attacker's controlled domain instead of the legitimate application, allowing the attacker to capture valid password reset tokens (PayloadsAllTheThings).
The application should properly validate and sanitize the Host header in password reset requests to prevent header injection attacks. Additionally, the password reset functionality should be designed to only accept and process requests from legitimate application domains (Known Github).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."