Beehive Forum header injection |
NAME
Beehive Forum header injection
- Platforms Affected:
Beehive Forum Beehive Forum 1.5.2 - Risk Level:
8.8 - Exploitability:
Proof of Concept - Consequences:
Gain Access
DESCRIPTION
Beehive Forum is vulnerable to HTTP header injection, caused by improper validation of input by the password reset functionality. By persuading a victim to visit a specially-crafted Web page, a remote attacker could exploit this vulnerability to inject an arbitrary HTTP Host header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Unavailable
MITIGATION
No remedy available as of May 11, 2022.
- Reference Link:
https://packetstormsecurity.com/files/167075 - Reference Link:
https://www.exploit-db.com/exploits/50923
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.