First published: Fri Aug 09 2024(Updated: )
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/apache/incubator-answer | <1.3.6 | 1.3.6 |
Apache Answer | <1.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41890 is classified as medium due to potential exposure from multiple password reset emails within the link's validity period.
To fix CVE-2024-41890, update your Apache Answer installation to version 1.3.6 or later.
CVE-2024-41890 affects Apache Answer versions through 1.3.5.
CVE-2024-41890 can potentially lead to unauthorized access due to multiple valid password reset links being issued.
No, CVE-2024-41890 is not present in Apache Answer version 1.3.6 or later.