CVE-2024-45979: n/a
A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
AI Analysis
Technical Summary
CVE-2024-45979 is a high-severity host header injection vulnerability identified in Lines Police CAD 1.0, a computer-aided dispatch system used by law enforcement agencies. The vulnerability arises because the application improperly trusts the HTTP Host header during the password reset process. An attacker can craft a malicious password reset link containing a manipulated Host header. When a legitimate user interacts with this link, the system generates a password reset token that is exposed or redirected to the attacker-controlled domain or endpoint. This token can then be used by the attacker to reset the victim's password without authorization, effectively compromising the victim's account. The vulnerability requires no authentication but does require user interaction (clicking the crafted link). The CVSS v3.1 score of 8.8 reflects the network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. The CWE-601 classification indicates an open redirect or improper validation of URLs, which aligns with the host header injection nature of this flaw. No patches or official fixes have been released at the time of publication, and no exploits are known to be active in the wild. This vulnerability poses a significant risk to the security of user accounts and the integrity of the Lines Police CAD system, potentially allowing attackers to disrupt law enforcement operations or access sensitive information.
Potential Impact
The exploitation of CVE-2024-45979 can lead to unauthorized account takeover by allowing attackers to reset passwords of legitimate users. This compromises the confidentiality of user credentials and sensitive data accessible through compromised accounts. Integrity is impacted as attackers can alter account settings or impersonate users within the system. Availability may also be affected if attackers lock out legitimate users or disrupt dispatch operations. For law enforcement agencies relying on Lines Police CAD 1.0, such compromises could hinder emergency response, expose sensitive operational data, and damage public trust. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could be highly effective. The lack of patches increases the window of exposure. Organizations worldwide using this software face risks of operational disruption and data breaches, with potential legal and reputational consequences.
Mitigation Recommendations
1. Immediately implement strict validation of the HTTP Host header on the server side to ensure it matches expected, whitelisted domains. 2. Avoid using the Host header directly in password reset link generation or token handling; instead, use fixed, server-side configured URLs. 3. Employ additional verification steps in the password reset workflow, such as multi-factor authentication or secondary confirmation channels. 4. Monitor logs for unusual password reset requests or patterns indicative of host header manipulation. 5. Educate users about phishing risks and the dangers of interacting with unsolicited password reset links. 6. If possible, isolate or restrict access to the Lines Police CAD system to trusted networks to reduce exposure. 7. Coordinate with the software vendor for timely patching and updates once available. 8. Consider implementing web application firewalls (WAFs) with rules to detect and block host header injection attempts. 9. Conduct regular security assessments and penetration tests focusing on input validation and authentication flows.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Netherlands, Sweden, Norway, Finland
CVE-2024-45979: n/a
Description
A host header injection vulnerability in Lines Police CAD 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link. This allows attackers to arbitrarily reset other users' passwords and compromise their accounts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45979 is a high-severity host header injection vulnerability identified in Lines Police CAD 1.0, a computer-aided dispatch system used by law enforcement agencies. The vulnerability arises because the application improperly trusts the HTTP Host header during the password reset process. An attacker can craft a malicious password reset link containing a manipulated Host header. When a legitimate user interacts with this link, the system generates a password reset token that is exposed or redirected to the attacker-controlled domain or endpoint. This token can then be used by the attacker to reset the victim's password without authorization, effectively compromising the victim's account. The vulnerability requires no authentication but does require user interaction (clicking the crafted link). The CVSS v3.1 score of 8.8 reflects the network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. The CWE-601 classification indicates an open redirect or improper validation of URLs, which aligns with the host header injection nature of this flaw. No patches or official fixes have been released at the time of publication, and no exploits are known to be active in the wild. This vulnerability poses a significant risk to the security of user accounts and the integrity of the Lines Police CAD system, potentially allowing attackers to disrupt law enforcement operations or access sensitive information.
Potential Impact
The exploitation of CVE-2024-45979 can lead to unauthorized account takeover by allowing attackers to reset passwords of legitimate users. This compromises the confidentiality of user credentials and sensitive data accessible through compromised accounts. Integrity is impacted as attackers can alter account settings or impersonate users within the system. Availability may also be affected if attackers lock out legitimate users or disrupt dispatch operations. For law enforcement agencies relying on Lines Police CAD 1.0, such compromises could hinder emergency response, expose sensitive operational data, and damage public trust. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could be highly effective. The lack of patches increases the window of exposure. Organizations worldwide using this software face risks of operational disruption and data breaches, with potential legal and reputational consequences.
Mitigation Recommendations
1. Immediately implement strict validation of the HTTP Host header on the server side to ensure it matches expected, whitelisted domains. 2. Avoid using the Host header directly in password reset link generation or token handling; instead, use fixed, server-side configured URLs. 3. Employ additional verification steps in the password reset workflow, such as multi-factor authentication or secondary confirmation channels. 4. Monitor logs for unusual password reset requests or patterns indicative of host header manipulation. 5. Educate users about phishing risks and the dangers of interacting with unsolicited password reset links. 6. If possible, isolate or restrict access to the Lines Police CAD system to trusted networks to reduce exposure. 7. Coordinate with the software vendor for timely patching and updates once available. 8. Consider implementing web application firewalls (WAFs) with rules to detect and block host header injection attempts. 9. Conduct regular security assessments and penetration tests focusing on input validation and authentication flows.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf5b7ef31ef0b56a80f
Added to database: 2/25/2026, 9:43:17 PM
Last enriched: 2/26/2026, 8:25:13 AM
Last updated: 4/12/2026, 7:55:21 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.