CVE-2023-47107
HIGHTHM Pilos < 2.3.0 - Password Reset Weakness
Title source: ruleDescription
PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.
Scores
CVSS v3
8.8
EPSS
0.0028
EPSS Percentile
51.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Classification
CWE
CWE-20
CWE-640
Status
published
Affected Products (1)
thm/pilos
< 2.3.0
Timeline
Published
Nov 08, 2023
Tracked Since
Feb 18, 2026