Vulnerability Description
The from method in library/core/class.email.php in Vanilla Forums before 2.3.1 allows remote attackers to spoof the email domain in sent messages and potentially obtain sensitive information via a crafted HTTP Host header, as demonstrated by a password reset request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vanillaforums | Vanilla | <= 2.3.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/142486/Vanilla-Forums-2.3-Remote-Code-ExecuExploitThird Party AdvisoryVDB Entry
- https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016ExploitThird Party Advisory
- https://open.vanillaforums.com/discussion/33498/critical-security-release-vanillPatchVendor Advisory
- https://www.exploit-db.com/exploits/41996/ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/142486/Vanilla-Forums-2.3-Remote-Code-ExecuExploitThird Party AdvisoryVDB Entry
- https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016ExploitThird Party Advisory
- https://open.vanillaforums.com/discussion/33498/critical-security-release-vanillPatchVendor Advisory
- https://www.exploit-db.com/exploits/41996/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2016-10073?
CVE-2016-10073 is a vulnerability with a CVSS score of 7.5 (HIGH). The from method in library/core/class.email.php in Vanilla Forums before 2.3.1 allows remote attackers to spoof the email domain in sent messages and potentially obtain sensitive information via a cra...
How severe is CVE-2016-10073?
CVE-2016-10073 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10073?
Check the references section above for vendor advisories and patch information. Affected products include: Vanillaforums Vanilla.