|
Message-ID: <6a70d108.3e4.15795170728.Coremail.hongkun.zeng@dbappsecurity.com.cn> Date: Wed, 5 Oct 2016 21:44:56 +0800 (GMT+08:00) From: "Hongkun Zeng" <hongkun.zeng@...ppsecurity.com.cn> To: oss-security <oss-security@...ts.openwall.com> Subject: CVE-2016-7903: Dotclear <= 2.10.2 Password Reset Address Spoof Vulnerability: Dotclear <= 2.10.2 Password Reset Address Spoof CVE: CVE-2016-7903 Discovered by: Hongkun Zeng (http://www.dbappsecurity.com.cn/) Dotclear is an open source blog publishing application distributed under the GNU GPLv2. The vulnerability can be triggered only if the Host header is not part of the web server routing process (e.g. if several domains are served by the same web server). This can lead to phishing attacks because of the modification of the site's links. (A remote unauthenticated attacker can change the host in reset password address.) Fix commit: https://hg.dotclear.org/dotclear/rev/bb06343f4247
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.