CVE-2022-23064

In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta3:*:*:*:*:*:*

History

10 May 2022, 16:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : 6.8
v3 : 8.8
CPE cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:snipeitapp:snipe-it:3.0.0:alpha1:*:*:*:*:*:*
References (MISC) https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064 - (MISC) https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064 - Exploit, Third Party Advisory
References (MISC) https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc - (MISC) https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc - Patch, Third Party Advisory
First Time Snipeitapp
Snipeitapp snipe-it

02 May 2022, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-02 13:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-23064

Mitre link : CVE-2022-23064

CVE.ORG link : CVE-2022-23064


JSON object : View

Products Affected

snipeitapp

  • snipe-it
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')