gsd-2017-9303
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-9303", "description": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.", "id": "GSD-2017-9303" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-9303" ], "details": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.", "id": "GSD-2017-9303", "modified": "2023-12-13T01:21:07.876665Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix", "refsource": "CONFIRM", "url": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix" }, { "name": "98776", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98776" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c5.4.27", "affected_versions": "All versions before 5.4.27", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-937" ], "date": "2017-06-08", "description": "There\u0027s a vulnerability that allows phishing attempts on users of the application. Using the password reset system, malicious users can attempt to trick your users into entering their login credentials into a separate application that they control. Since the password reset notification uses the host of the incoming request to build the password reset URL, the host of the password reset URL may be spoofed. If users do not notice that they are not on their intended application\u0027s domain, they may accidentally enter their login credentials into a malicious application.", "fixed_versions": [ "v5.4.27" ], "identifier": "CVE-2017-9303", "identifiers": [ "CVE-2017-9303" ], "package_slug": "packagist/illuminate/auth", "pubdate": "2017-05-29", "solution": "Upgrade to fixed version", "title": "User phishing", "urls": [ "https://laravel.com/docs/5.4/releases#laravel-5.4.22" ], "uuid": "16764400-1b67-47dc-a2f9-0499a0197d07" }, { "affected_range": "\u003c5.4.22", "affected_versions": "All versions before 5.4.22", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-937" ], "date": "2017-06-08", "description": "There\u0027s a vulnerability that allows phishing attempts on users of the application. Using the password reset system, malicious users can attempt to trick your users into entering their login credentials into a separate application that they control. Since the password reset notification uses the host of the incoming request to build the password reset URL, the host of the password reset URL may be spoofed. If users do not notice that they are not on their intended application\u0027s domain, they may accidentally enter their login credentials into a malicious application.", "fixed_versions": [ "v5.4.22" ], "identifier": "CVE-2017-9303", "identifiers": [ "CVE-2017-9303" ], "package_slug": "packagist/laravel/framework", "pubdate": "2017-05-29", "solution": "Upgrade to fixed version", "title": "User phishing", "urls": [ "https://laravel.com/docs/5.4/releases#laravel-5.4.22" ], "uuid": "b1fc6162-300b-425e-891e-44c3fcbf4d75" }, { "affected_range": "\u003e=v5.2.45,\u003cv5.4.22", "affected_versions": "All versions starting from v5.2.45 before v5.4.22", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-20", "CWE-937" ], "date": "2017-06-08", "description": "This package does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host. ", "fixed_versions": [ "v5.4.23" ], "identifier": "CVE-2017-9303", "identifiers": [ "CVE-2017-9303" ], "not_impacted": "All versions before v5.2.45, all versions starting from v5.4.22", "package_slug": "packagist/laravel/laravel", "pubdate": "2017-05-29", "solution": "Upgrade to version v5.4.23 or above.", "title": "Security Bypass Vulnerability", "urls": [ "https://github.com/laravel/framework/issues/18697", "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix" ], "uuid": "3752906d-bf64-41ee-b0a1-b6eb55e2c466" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:laravel:laravel:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9303" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix" }, { "name": "98776", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98776" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2017-06-08T16:57Z", "publishedDate": "2017-05-29T22:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.