First published: Wed Aug 04 2021(Updated: )
Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Akaunting Akaunting | <2.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36804 has a medium severity rating due to the potential for unauthorized password reset functionality.
To fix CVE-2021-36804, upgrade Akaunting to version 2.1.13 or later.
CVE-2021-36804 allows attackers to proxy password reset requests, potentially compromising user accounts.
Users of Akaunting version 2.1.12 and earlier are affected by CVE-2021-36804.
Exploitation of CVE-2021-36804 may result in unauthorized password resets and account access.