CVE-2024-45981

8.8 HIGH

📋 TL;DR

A host header injection vulnerability in BookReviewLibrary 1.0 allows attackers to craft malicious password reset links that redirect users to attacker-controlled servers, enabling theft of password reset tokens. This affects all BookReviewLibrary 1.0 installations with password reset functionality enabled. Attackers can hijack user accounts by obtaining valid reset tokens.

💻 Affected Systems

Products:
  • BookReviewLibrary
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when password reset functionality is enabled (default).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of all users, including administrators, leading to data theft, privilege escalation, and potential system compromise.

🟠

Likely Case

Targeted account takeover of specific users through phishing campaigns, resulting in unauthorized access to user data and potential lateral movement.

🟢

If Mitigated

Limited impact with proper email validation and user awareness, though some users may still fall victim to sophisticated phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but is straightforward to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://github.com/soursec/CVEs/tree/main/CVE-2024-45981

Restart Required: No

Instructions:

No official patch available. Apply workarounds or consider alternative software.

🔧 Temporary Workarounds

Host Header Validation

all

Implement server-side validation to reject or sanitize unexpected Host headers in password reset requests.

Modify application code to validate Host header against allowed domains list

Disable Password Reset

all

Temporarily disable password reset functionality to prevent exploitation.

Disable password reset feature in application configuration

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious Host header patterns.
  • Educate users to verify password reset email domains and avoid clicking suspicious links.

🔍 How to Verify

Check if Vulnerable:

Test by sending password reset request with manipulated Host header and checking if token is sent to external domain.

Check Version:

Check application version in admin panel or configuration files.

Verify Fix Applied:

Confirm that password reset tokens are only sent to validated domains and Host header injection is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Host header values in password reset requests
  • Password reset attempts to external domains

Network Indicators:

  • Outbound connections to unknown domains following password reset requests

SIEM Query:

source="web_logs" AND (url="*/password-reset*" AND host_header!="expected-domain.com")

🔗 References

📤 Share & Export