Skip to content

Malicious password-reset in Akaunting

High severity GitHub Reviewed Published Sep 1, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

composer akaunting/akaunting (Composer)

Affected versions

< 2.1.13

Patched versions

2.1.13

Description

Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications.

References

Published by the National Vulnerability Database Aug 4, 2021
Reviewed Aug 30, 2021
Published to the GitHub Advisory Database Sep 1, 2021
Last updated Feb 1, 2023

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Weaknesses

CVE ID

CVE-2021-36804

GHSA ID

GHSA-246r-r2wf-frhx

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.