Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45981: n/a

0
High
VulnerabilityCVE-2024-45981cvecve-2024-45981
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A host header injection vulnerability in BookReviewLibrary 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:25:45 UTC

Technical Analysis

CVE-2024-45981 is a host header injection vulnerability identified in BookReviewLibrary version 1.0. The vulnerability arises due to insufficient validation of the HTTP Host header in the password reset functionality. Attackers can craft a malicious password reset URL containing a manipulated Host header value. When a legitimate user interacts with this crafted link, the application incorrectly processes the Host header, allowing the attacker to intercept or obtain the password reset token. This token can then be used to reset the user's password, effectively granting the attacker unauthorized access to the victim's account. The vulnerability is classified under CWE-601, which involves open redirect or improper validation of URLs, facilitating phishing or token theft attacks. The CVSS v3.1 base score is 8.8, reflecting high impact across confidentiality, integrity, and availability, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. No patches or official fixes are currently listed, and no known exploits have been reported in the wild as of the publication date. The vulnerability's exploitation scope is limited to BookReviewLibrary 1.0 installations that expose password reset functionality and do not implement additional host header validation or token protections.

Potential Impact

The exploitation of this vulnerability can lead to severe consequences for affected organizations. Attackers gaining access to password reset tokens can hijack user accounts, potentially leading to unauthorized access to sensitive data, privilege escalation, and further lateral movement within the affected environment. Confidentiality is compromised as attackers can access private user information. Integrity is impacted because attackers can change account credentials and potentially manipulate user data. Availability could be affected if attackers lock out legitimate users by changing passwords or disrupting account access. For organizations relying on BookReviewLibrary 1.0, especially those handling sensitive or personal data, this vulnerability poses a significant risk of data breaches and reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trick users into clicking malicious links, increasing the attack surface. The lack of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2024-45981, organizations should implement strict validation of the Host header in all HTTP requests, ensuring it matches a whitelist of trusted domains or expected values. Employing canonicalization and normalization techniques can prevent header manipulation. Additionally, password reset tokens should be bound to the original request context and validated server-side to prevent token leakage or reuse. Implementing multi-factor authentication (MFA) can reduce the impact of compromised credentials. Monitoring and logging unusual password reset requests and link clicks can help detect exploitation attempts. If possible, upgrade or patch BookReviewLibrary to a fixed version once available. In the interim, consider disabling password reset functionality or adding CAPTCHA and email verification steps to reduce automated exploitation risk. Educate users about phishing risks and encourage caution when clicking password reset links from untrusted sources. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block suspicious Host header values. Finally, conduct regular security assessments and code reviews focusing on input validation and authentication workflows.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf5b7ef31ef0b56a815

Added to database: 2/25/2026, 9:43:17 PM

Last enriched: 2/26/2026, 8:25:45 AM

Last updated: 4/12/2026, 3:34:01 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses