First published: Sun May 07 2017(Updated: )
Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/laravel/framework | >=5.3.0<=5.3.31>=5.4.0<5.4.22 | |
composer/illuminate/auth | >=5.3.0<=5.3.31>=5.4.0<5.4.22 | |
composer/laravel/framework | >=5.4.0<5.4.22 | 5.4.22 |
composer/laravel/framework | >=5.3.0<=5.3.31 | |
composer/illuminate/auth | >=5.4.0<5.4.22 | 5.4.22 |
composer/illuminate/auth | >=5.3.0<=5.3.31 | |
composer/laravel/laravel | >=5.4.0<5.4.22 | 5.4.22 |
Laravel Framework | =5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9303 is considered a medium severity vulnerability due to its potential for password reset phishing attacks.
To fix CVE-2017-9303, update your Laravel framework to version 5.4.22 or later.
CVE-2017-9303 affects Laravel versions 5.4.0 through 5.4.21 and 5.3.0 through 5.3.31.
CVE-2017-9303 enables remote attackers to conduct phishing attacks by manipulating the host portion of password-reset URLs.
No, CVE-2017-9303 is not present in Laravel 5.4.22 or later, as those versions contain the necessary security fix.