CVE-2024-41890

CWE-7725 documents4 sources
Severity
5.3MEDIUM
EPSS
0.6%
top 30.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 12
Latest updateAug 13

Description

Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

🔴Vulnerability Details

4
OSV
Apache Answer: The link to reset the user's password will remain valid after sending a new link in github.com/apache/incubator-answer2024-08-13
GHSA
Apache Answer: The link to reset the user's password will remain valid after sending a new link2024-08-12
OSV
Apache Answer: The link to reset the user's password will remain valid after sending a new link2024-08-12
CVEList
Apache Answer: The link to reset the user's password will remain valid after sending a new link2024-08-09
CVE-2024-41890 (MEDIUM CVSS 5.3) | Missing Release of Resource after E | cvebase.io