Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ndnB2LXIzMnYtOTczN84AA-hg
Apache Answer: The link to reset the user's password will remain valid after sending a new link
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, which fixes the issue.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ndnB2LXIzMnYtOTczN84AA-hg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 3 months ago
Updated: 3 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-gvpv-r32v-9737, CVE-2024-41890
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-41890
- https://lists.apache.org/thread/j7c080xj31x8rvz1pyk2h47rdd9pwbv9
- https://github.com/apache/incubator-answer/commit/2820efc454f5808974dce0aa99aac106be3f727b
- https://github.com/advisories/GHSA-gvpv-r32v-9737
Blast Radius: 1.0
Affected Packages
go:github.com/apache/incubator-answer
Dependent packages: 21Dependent repositories: 0
Downloads:
Affected Version Ranges: < 1.3.6
Fixed in: 1.3.6
All affected versions: 0.2.0, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.2.1, 1.2.5
All unaffected versions: