-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
password reset link security vulnerability #447
Comments
This may fix the issue. Need to upgrade secure social. |
@lmarini and I brainstormed some possible fix:
In below places:
and
|
Host_IP see here: Line 24 in f28c203
In the .html template, here is an example of how you get variable (e.g. sortInMemory)
|
Problem is that the hostIp is almost never set, this was a hack for one of the previewers. Since the URL can change we tried to not hardcode this in the configuration. The following code try to see what the URL should be. https://github.com/clowder-framework/clowder/blob/develop/app/util/RequestUtils.scala#L15 https://github.com/clowder-framework/clowder/blob/develop/app/controllers/Utils.scala#L18 |
Maybe it's time we introduce another config variables? The idea is we need to have control on the host in the email sent out to avoid host header injection.. i think... |
I think the similar idea of |
Host Header Injection: By capture the POST request for a password reset sent
to https://cpmr.tacc.utexas.edu/reset, a malicious user can edit the Host
entry in the header. This will modify the password reset link sent to the user
to direct them to the attacker's site.
The text was updated successfully, but these errors were encountered: