In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Talkyard | Talkyard | 0.04.01 (including) | 0.6.74-wip-63220cb (including) |
Talkyard | Talkyard | 0.2020.22-wip-b2e97fe0e (including) | 0.2021.02-wip-879ef3fe1 (including) |
Talkyard | Talkyard | tyse-v0.2021.02-879ef3fe1-regular (including) | tyse-v0.2021.28-af66b6905-regular (including) |