CVE-2019-11514
Published on: 04/24/2019 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:36 PM UTC
Certain versions of Flarum from Flarum contain the following vulnerability:
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
- CVE-2019-11514 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | NONE |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Always invalidate all user email tokens · flarum/[email protected] · GitHub | Patch Third Party Advisory github.com text/html |
![]() |
Flarum 0.1.0-beta.8 Released - Flarum Community | Third Party Advisory discuss.flarum.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Flarum | Flarum | 0.1.0 | - | All | All |
Application | Flarum | Flarum | 0.1.0 | beta | All | All |
Application | Flarum | Flarum | 0.1.0 | beta2 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta3 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta4 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta5 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta6 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7.1 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7.2 | All | All |
Application | Flarum | Flarum | 0.1.0 | - | All | All |
Application | Flarum | Flarum | 0.1.0 | beta | All | All |
Application | Flarum | Flarum | 0.1.0 | beta2 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta3 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta4 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta5 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta6 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7.1 | All | All |
Application | Flarum | Flarum | 0.1.0 | beta7.2 | All | All |
- cpe:2.3:a:flarum:flarum:0.1.0:-:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta2:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta3:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta4:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta5:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta6:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7.1:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7.2:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:-:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta2:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta3:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta4:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta5:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta6:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7.1:*:*:*:*:*:*:
- cpe:2.3:a:flarum:flarum:0.1.0:beta7.2:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE