CVE-2023-47107

PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thm:pilos:*:*:*:*:*:*:*:*

History

16 Nov 2023, 14:27

Type Values Removed Values Added
References () https://github.com/THM-Health/PILOS/security/advisories/GHSA-mc6f-fj9h-5735 - () https://github.com/THM-Health/PILOS/security/advisories/GHSA-mc6f-fj9h-5735 - Vendor Advisory
CPE cpe:2.3:a:thm:pilos:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Thm
Thm pilos
CWE CWE-640

08 Nov 2023, 17:25

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-08 16:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-47107

Mitre link : CVE-2023-47107

CVE.ORG link : CVE-2023-47107


JSON object : View

Products Affected

thm

  • pilos
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password

CWE-20

Improper Input Validation