CVE-2024-45979

8.8 HIGH

📋 TL;DR

A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to manipulate password reset links to steal reset tokens. Attackers can then reset any user's password and take over their account. All users of Lines Police CAD 1.0 are affected.

💻 Affected Systems

Products:
  • Lines Police CAD
Versions: 1.0
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, including administrative accounts, leading to full system takeover and potential data breach.

🟠

Likely Case

Attackers reset passwords for regular users, gaining unauthorized access to sensitive police CAD data and potentially disrupting operations.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though account compromise remains possible.

🌐 Internet-Facing: HIGH - If the application is exposed to the internet, attackers can exploit this remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires some network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but is technically simple. Public proof-of-concept exists in the GitHub reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or consider workarounds.

🔧 Temporary Workarounds

Host Header Validation

all

Implement server-side validation to reject or sanitize malicious Host headers in password reset requests.

# Requires application code modification - validate Host header matches expected domain

Network Segmentation

all

Restrict access to the application to trusted networks only, preventing external exploitation.

# Configure firewall rules to allow only authorized IPs to access the application

🧯 If You Can't Patch

  • Implement multi-factor authentication (MFA) for all accounts to reduce impact of password resets.
  • Monitor logs for unusual password reset activity and implement alerting for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Test by sending a password reset request with a malicious Host header and checking if the reset link contains the injected domain.

Check Version:

Check application interface or configuration files for version information (typically shows 'Lines Police CAD 1.0').

Verify Fix Applied:

Verify that password reset links no longer reflect manipulated Host headers and only use legitimate application domains.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, especially with non-standard Host headers or from unexpected IPs.
  • Multiple password reset attempts for different users in short timeframes.

Network Indicators:

  • HTTP requests with manipulated Host headers targeting password reset endpoints.
  • Unusual outbound traffic following password reset completions.

SIEM Query:

source="web_logs" AND (uri="/password-reset" OR uri="/reset-password") AND (host_header!="expected-domain.com" OR host_header CONTAINS "malicious")

🔗 References

📤 Share & Export