Unrated severityNVD Advisory· Published Nov 8, 2023· Updated Sep 4, 2024
PILOS account takeover through password reset poisoning
CVE-2023-47107
Description
PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.
Affected products
1- Range: >= 2.0.0, < 2.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/THM-Health/PILOS/security/advisories/GHSA-mc6f-fj9h-5735mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.