Exploit
CVE-2024-51329

Improper Control of Generation of Code ('Code Injection') (CWE-94)

Published: Nov 4, 2024 / Updated: 15d ago

010
CVSS 8.8EPSS 0.04%High
CVE info copied to clipboard

Summary

A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.

Impact

This vulnerability could lead to unauthorized access to user accounts. Attackers can potentially hijack user sessions by obtaining password reset tokens, which could result in a breach of confidentiality and integrity of user data. The CVSS base score of 8.8 (High) indicates a significant risk, with high impacts on confidentiality, integrity, and availability. The attack vector is network-based, requires low attack complexity, and no privileges, but does require user interaction.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

No specific patch information is provided. However, as the vulnerability is identified in Agile-Board version 1.0, it's likely that updating to a newer version (if available) might address this issue.

Mitigation

1. Update Agile-Board to the latest version if a patch is available. 2. Implement strict input validation and sanitization for the Host header. 3. Use secure, randomly generated tokens for password reset functionality. 4. Implement proper session management and token handling. 5. Educate users about the risks of interacting with unsolicited password reset links. 6. Consider implementing additional authentication factors for sensitive operations like password resets.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-51329

Nov 4, 2024 at 6:15 PM
First Article

Feedly found the first article mentioning CVE-2024-51329. See article

Nov 4, 2024 at 6:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 4, 2024 at 6:21 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 10%)

Nov 5, 2024 at 10:05 AM
CVSS

A CVSS base score of 8.1 has been assigned.

Nov 5, 2024 at 9:40 PM / nvd
CVSS

A CVSS base score of 8.8 has been assigned.

Nov 6, 2024 at 7:20 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Nov 6, 2024 at 10:10 PM
Static CVE Timeline Graph

Affected Systems

Idrsdev/agile-board
+null more

Exploits

https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51329%20-%20Host%20Header%20Injection
+null more

Attack Patterns

CAPEC-242: Code Injection
+null more

News

CVE-2024-51329 Exploit
CVE Id : CVE-2024-51329 Published Date: 2024-11-06T19:19:00+00:00 A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. inTheWild added a link to an exploit: https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51329%20-%20Host%20Header%20Injection
Security Bulletin 06 Nov 2024 - Cyber Security Agency of Singapore
For those vulnerabilities without assigned CVSS scores, please visit NVD for the updated CVSS vulnerability entries. CRITICAL VULNERABILITIES . CVE ...
NA - CVE-2024-51329 - A Host header injection vulnerability in...
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.
CVE-2024-51329 | Agile-Board 1.0 Password Reset Token Host password recovery
A vulnerability, which was classified as problematic , was found in Agile-Board 1.0 . Affected is an unknown function of the component Password Reset Token Handler . The manipulation of the argument Host leads to weak password recovery. This vulnerability is traded as CVE-2024-51329 . Access to the local network is required for this attack to succeed. There is no exploit available.
CVE-2024-51329
A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset...
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI