Issue #603 has been updated by Clément OUDOT. Status changed from New to Assigned Assigned to set to Clément OUDOT Target version set to self-service-password-?
---------------------------------------- Bug #603: Header manipulation - sendsms.php http://tools.lsc-project.org/issues/603 Author: John Menerick Status: Assigned Priority: High Assigned to: Clément OUDOT Category: Self Service Password Target version: self-service-password-? There is a header manipulation vulnerability in sendsms.php. On line 38, the token request is assigned to $token. Later on, line 206, it is assigned to $reset_url . Then on line 209, the header is constructed with the unvalidated token request and sent back to the browser. Malicious tokens may cause page hijacking, cross-user defacement, cookie manipulation, open redirect, and other header-related security issues. See http://www.hpenterprisesecurity.com/vulncat/en/vulncat/php/header_manipulation.html for additional information. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://tools.lsc-project.org/my/account
_______________________________________________ ltb-dev mailing list [email protected] http://lists.ltb-project.org/listinfo/ltb-dev
