CVE-2021-30185

Published on: 04/07/2021 12:00:00 AM UTC

Last Modified on: 04/15/2021 02:13:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Indico from Cern contain the following vulnerability:

CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link.

  • CVE-2021-30185 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Release v2.3.4 · indico/indico · GitHub github.com
text/html
URL Logo MISC github.com/indico/indico/releases/tag/v2.3.4
Have you configured Nessus to betray you? Shorebreak Security - Experts in Information Security Testing www.shorebreaksecurity.com
text/html
URL Logo MISC www.shorebreaksecurity.com/blog/

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCernIndicoAllAllAllAll
  • cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-30185 : CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link.... cve.report/CVE-2021-30185 2021-04-07 14:01:48