CVE Vulnerabilities

CVE-2021-25980

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Nov 11, 2021 | Modified: Nov 16, 2021
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Talkyard Talkyard 0.04.01 (including) 0.6.74-wip-63220cb (including)
Talkyard Talkyard 0.2020.22-wip-b2e97fe0e (including) 0.2021.02-wip-879ef3fe1 (including)
Talkyard Talkyard tyse-v0.2021.02-879ef3fe1-regular (including) tyse-v0.2021.28-af66b6905-regular (including)

Potential Mitigations

References