ThingsBoard before v3.2 is vulnerable to Host header injection in password-reset emails. This allows an attacker to send malicious links in password-reset emails to victims, pointing to an attacker-controlled server. Lack of validation of the Host header allows this to happen.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/thingsboard/thingsboard/commits/master | third party advisory |
https://gist.github.com/vin01/26a8bb13233acd9425e7575a7ad4c936 | third party advisory exploit |