First published: Fri Aug 09 2024(Updated: )
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/apache/incubator-answer | <1.3.6 | 1.3.6 |
Apache Answer | <1.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41888 has a medium severity rating due to the potential for misuse of expired password reset links.
To fix CVE-2024-41888, upgrade Apache Answer to version 1.3.6 or later to ensure proper handling of password reset links.
The risks associated with CVE-2024-41888 include unauthorized access to accounts due to expired password reset links that remain valid.
CVE-2024-41888 affects all versions of Apache Answer up to and including version 1.3.5.
Yes, CVE-2024-41888 should be addressed promptly to prevent potential security breaches related to password reset functionality.