Lucene search

K
nvd[email protected]NVD:CVE-2024-6203
HistoryAug 06, 2024 - 6:15 a.m.

CVE-2024-6203

2024-08-0606:15:35
CWE-640
web.nvd.nist.gov
4
haloitsm
password reset
poisoning
vulnerability
account takeover
cve-2024-6203

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

39.6%

HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim’s account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.

Affected configurations

Nvd
Node
haloservicesolutionshaloitsmRange<2.143.61
OR
haloservicesolutionshaloitsmRange2.1442.146.1
VendorProductVersionCPE
haloservicesolutionshaloitsm*cpe:2.3:a:haloservicesolutions:haloitsm:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

39.6%

Related for NVD:CVE-2024-6203