Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45979: n/a

0
High
VulnerabilityCVE-2024-45979cvecve-2024-45979
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:25:13 UTC

Technical Analysis

CVE-2024-45979 is a high-severity host header injection vulnerability identified in Lines Police CAD 1.0, a computer-aided dispatch system used by law enforcement agencies. The vulnerability arises because the application improperly trusts the HTTP Host header during the password reset process. An attacker can craft a malicious password reset link containing a manipulated Host header. When a legitimate user interacts with this link, the system generates a password reset token that is exposed or redirected to the attacker-controlled domain or endpoint. This token can then be used by the attacker to reset the victim's password without authorization, effectively compromising the victim's account. The vulnerability requires no authentication but does require user interaction (clicking the crafted link). The CVSS v3.1 score of 8.8 reflects the network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. The CWE-601 classification indicates an open redirect or improper validation of URLs, which aligns with the host header injection nature of this flaw. No patches or official fixes have been released at the time of publication, and no exploits are known to be active in the wild. This vulnerability poses a significant risk to the security of user accounts and the integrity of the Lines Police CAD system, potentially allowing attackers to disrupt law enforcement operations or access sensitive information.

Potential Impact

The exploitation of CVE-2024-45979 can lead to unauthorized account takeover by allowing attackers to reset passwords of legitimate users. This compromises the confidentiality of user credentials and sensitive data accessible through compromised accounts. Integrity is impacted as attackers can alter account settings or impersonate users within the system. Availability may also be affected if attackers lock out legitimate users or disrupt dispatch operations. For law enforcement agencies relying on Lines Police CAD 1.0, such compromises could hinder emergency response, expose sensitive operational data, and damage public trust. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could be highly effective. The lack of patches increases the window of exposure. Organizations worldwide using this software face risks of operational disruption and data breaches, with potential legal and reputational consequences.

Mitigation Recommendations

1. Immediately implement strict validation of the HTTP Host header on the server side to ensure it matches expected, whitelisted domains. 2. Avoid using the Host header directly in password reset link generation or token handling; instead, use fixed, server-side configured URLs. 3. Employ additional verification steps in the password reset workflow, such as multi-factor authentication or secondary confirmation channels. 4. Monitor logs for unusual password reset requests or patterns indicative of host header manipulation. 5. Educate users about phishing risks and the dangers of interacting with unsolicited password reset links. 6. If possible, isolate or restrict access to the Lines Police CAD system to trusted networks to reduce exposure. 7. Coordinate with the software vendor for timely patching and updates once available. 8. Consider implementing web application firewalls (WAFs) with rules to detect and block host header injection attempts. 9. Conduct regular security assessments and penetration tests focusing on input validation and authentication flows.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf5b7ef31ef0b56a80f

Added to database: 2/25/2026, 9:43:17 PM

Last enriched: 2/26/2026, 8:25:13 AM

Last updated: 4/12/2026, 7:55:21 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses