{ "schema_version": "1.4.0", "id": "GHSA-j8p2-hh7r-9r58", "modified": "2022-05-24T22:28:44Z", "published": "2022-05-24T22:28:44Z", "aliases": [ "CVE-2021-25980" ], "details": "In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25980" }, { "type": "WEB", "url": "https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289" }, { "type": "WEB", "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980" } ], "database_specific": { "cwe_ids": [ "CWE-74" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-11-11T07:15:00Z" } }