CVE-2023-47107

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-47107
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47107.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-47107
Related
  • GHSA-mc6f-fj9h-5735
Published
2023-11-08T16:15:10Z
Modified
2025-01-08T09:42:19.639907Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.

References

Affected packages

Git / github.com/thm-health/pilos

Affected ranges

Type
GIT
Repo
https://github.com/thm-health/pilos
Events

Affected versions

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.2.0