Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-47107
HistoryNov 08, 2023 - 3:39 p.m.

CVE-2023-47107 PILOS account takeover through password reset poisoning

2023-11-0815:39:50
CWE-20
CWE-640
GitHub_M
www.cve.org
1
cve-2023-47107
pilos
account takeover
password reset
poisoning
vulnerability
version 2.3.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.

CNA Affected

[
  {
    "vendor": "THM-Health",
    "product": "PILOS",
    "versions": [
      {
        "version": ">= 2.0.0, < 2.3.0",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.3%

Related for CVELIST:CVE-2023-47107