A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.