From 2b3e0117110261afc172467279880146bfe21671 Mon Sep 17 00:00:00 2001 From: Marc Alexander Date: Fri, 15 May 2026 08:22:04 +0200 Subject: [PATCH] Improve GHSA-7gm6-w7mx-58cr --- .../GHSA-7gm6-w7mx-58cr.json | 47 ++++++++++++++++++- 1 file changed, 45 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-7gm6-w7mx-58cr/GHSA-7gm6-w7mx-58cr.json b/advisories/unreviewed/2026/05/GHSA-7gm6-w7mx-58cr/GHSA-7gm6-w7mx-58cr.json index e640e1d0bc2d1..e61bd1800f967 100644 --- a/advisories/unreviewed/2026/05/GHSA-7gm6-w7mx-58cr/GHSA-7gm6-w7mx-58cr.json +++ b/advisories/unreviewed/2026/05/GHSA-7gm6-w7mx-58cr/GHSA-7gm6-w7mx-58cr.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-7gm6-w7mx-58cr", - "modified": "2026-05-04T21:30:24Z", + "modified": "2026-05-04T21:31:28Z", "published": "2026-05-04T09:31:09Z", "aliases": [ "CVE-2026-29199" ], + "summary": "Password Reset Link Poisoning via Host Header injection", "details": "phpBB before 3.3.16 is vulnerable to Host Header Injection that can lead to password rest link poisoning. When force_server_vars is disabled, the servers hostname may be extracted from the HTTP Host header which is used to generate the password reset link URL. An attacker who can manipulate the Host header (e.g. through misconfigured host setup or missing header validation by the webserver) can cause password reset emails to contain a link pointing to an attacker-controlled domain, potentially leading to account takeover.", "severity": [ { @@ -13,7 +14,49 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "phpbb/phpbb" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.3.16" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "phpbb/phpbb" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0.0-a1" + }, + { + "fixed": "4.0.0-a2" + } + ] + } + ], + "versions": [ + "4.0.0-a1" + ] + } + ], "references": [ { "type": "ADVISORY",