Issue #603 has been updated by Clément OUDOT.

Status changed from New to Assigned
Assigned to set to Clément OUDOT
Target version set to self-service-password-?


----------------------------------------
Bug #603: Header manipulation - sendsms.php
http://tools.lsc-project.org/issues/603

Author: John Menerick
Status: Assigned
Priority: High
Assigned to: Clément OUDOT
Category: Self Service Password
Target version: self-service-password-?


There is a header manipulation vulnerability in sendsms.php.

On line 38, the token request is assigned to $token.  Later on, line 206, it is 
assigned to $reset_url .   Then on line 209, the header is constructed with the 
unvalidated token request and sent back to the browser.    Malicious tokens may 
cause page hijacking, cross-user defacement, cookie manipulation, open 
redirect, and other header-related security issues.   See 
http://www.hpenterprisesecurity.com/vulncat/en/vulncat/php/header_manipulation.html
 for additional information.


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://tools.lsc-project.org/my/account
_______________________________________________
ltb-dev mailing list
[email protected]
http://lists.ltb-project.org/listinfo/ltb-dev

Reply via email to