GSD-2017-9303
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-9303",
"description": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.",
"id": "GSD-2017-9303"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-9303"
],
"details": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.",
"id": "GSD-2017-9303",
"modified": "2023-12-13T01:21:07.876665Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix",
"refsource": "CONFIRM",
"url": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix"
},
{
"name": "98776",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98776"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c5.4.27",
"affected_versions": "All versions before 5.4.27",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2017-06-08",
"description": "There\u0027s a vulnerability that allows phishing attempts on users of the application. Using the password reset system, malicious users can attempt to trick your users into entering their login credentials into a separate application that they control. Since the password reset notification uses the host of the incoming request to build the password reset URL, the host of the password reset URL may be spoofed. If users do not notice that they are not on their intended application\u0027s domain, they may accidentally enter their login credentials into a malicious application.",
"fixed_versions": [
"v5.4.27"
],
"identifier": "CVE-2017-9303",
"identifiers": [
"CVE-2017-9303"
],
"package_slug": "packagist/illuminate/auth",
"pubdate": "2017-05-29",
"solution": "Upgrade to fixed version",
"title": "User phishing",
"urls": [
"https://laravel.com/docs/5.4/releases#laravel-5.4.22"
],
"uuid": "16764400-1b67-47dc-a2f9-0499a0197d07"
},
{
"affected_range": "\u003c5.4.22",
"affected_versions": "All versions before 5.4.22",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2017-06-08",
"description": "There\u0027s a vulnerability that allows phishing attempts on users of the application. Using the password reset system, malicious users can attempt to trick your users into entering their login credentials into a separate application that they control. Since the password reset notification uses the host of the incoming request to build the password reset URL, the host of the password reset URL may be spoofed. If users do not notice that they are not on their intended application\u0027s domain, they may accidentally enter their login credentials into a malicious application.",
"fixed_versions": [
"v5.4.22"
],
"identifier": "CVE-2017-9303",
"identifiers": [
"CVE-2017-9303"
],
"package_slug": "packagist/laravel/framework",
"pubdate": "2017-05-29",
"solution": "Upgrade to fixed version",
"title": "User phishing",
"urls": [
"https://laravel.com/docs/5.4/releases#laravel-5.4.22"
],
"uuid": "b1fc6162-300b-425e-891e-44c3fcbf4d75"
},
{
"affected_range": "\u003e=v5.2.45,\u003cv5.4.22",
"affected_versions": "All versions starting from v5.2.45 before v5.4.22",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2017-06-08",
"description": "This package does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host. ",
"fixed_versions": [
"v5.4.23"
],
"identifier": "CVE-2017-9303",
"identifiers": [
"CVE-2017-9303"
],
"not_impacted": "All versions before v5.2.45, all versions starting from v5.4.22",
"package_slug": "packagist/laravel/laravel",
"pubdate": "2017-05-29",
"solution": "Upgrade to version v5.4.23 or above.",
"title": "Security Bypass Vulnerability",
"urls": [
"https://github.com/laravel/framework/issues/18697",
"https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix"
],
"uuid": "3752906d-bf64-41ee-b0a1-b6eb55e2c466"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:laravel:laravel:5.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9303"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://laravel-news.com/laravel-5-4-22-is-now-released-and-includes-a-security-fix"
},
{
"name": "98776",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98776"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2017-06-08T16:57Z",
"publishedDate": "2017-05-29T22:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…