Impact
The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed.
This only affects local user accounts and requires the password reset option to be enabled.
Patches
Users should update to v2.3
Workarounds
Set an explict Host
and X-Forwarded-Host
header in the reverse proxy.
References
Impact
The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed.
This only affects local user accounts and requires the password reset option to be enabled.
Patches
Users should update to v2.3
Workarounds
Set an explict
Host
andX-Forwarded-Host
header in the reverse proxy.References