CVE-2024-23648:
Host header injection in the password reset
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.01618%
CWE
Published
1/24/2024
Updated
1/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pimcore/admin-ui-classic-bundle | composer | < 1.2.3 | 1.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the lostpasswordAction method where reset URLs were constructed using the request's Host header. The commit diff shows the fix: 1) Added SystemSettingsConfig
to get a validated domain, 2) Modified router context to enforce this domain, and 3) Removed direct dependency on client-supplied Host header. The pre-patch code used $this->generateUrl()
with absolute URLs without host validation, making it susceptible to Host header injection. The function's parameters and URL generation logic directly match the described attack vector.