The Security/changepassword URL action in SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4 passes a token as a GET parameter while changing a password through email, which allows remote attackers to obtain sensitive data and hijack the session via the HTTP referer logs on a server, aka “HTTP referer leakage.”
doc.silverstripe.org/sapphire/en/trunk/changelogs//2.3.10
doc.silverstripe.org/sapphire/en/trunk/changelogs//2.4.4
open.silverstripe.org/changeset/114758
secunia.com/advisories/42346
www.openwall.com/lists/oss-security/2011/01/03/12
www.openwall.com/lists/oss-security/2012/04/30/1
www.openwall.com/lists/oss-security/2012/04/30/3
www.openwall.com/lists/oss-security/2012/05/01/3
www.osvdb.org/69887