cve/2023/CVE-2023-38877.md

18 lines
894 B
Markdown
Raw Normal View History

2024-06-09 00:33:16 +00:00
### [CVE-2023-38877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38877)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords.
### POC
#### Reference
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877
#### Github
No PoCs found on GitHub currently.