First published: Sun May 07 2017(Updated: )
Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/laravel/framework | >=5.3.0<=5.3.31>=5.4.0<5.4.22 | |
composer/illuminate/auth | >=5.3.0<=5.3.31>=5.4.0<5.4.22 | |
Laravel Laravel | =5.4.0 | |
composer/laravel/framework | >=5.4.0<5.4.22 | 5.4.22 |
composer/laravel/framework | >=5.3.0<=5.3.31 | |
composer/illuminate/auth | >=5.4.0<5.4.22 | 5.4.22 |
composer/illuminate/auth | >=5.3.0<=5.3.31 | |
composer/laravel/laravel | >=5.4.0<5.4.22 | 5.4.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.