CVE-2024-41890 – github.com/apache/incubator-answer
Package
Manager: go
Name: github.com/apache/incubator-answer
Vulnerable Version: >=0 <1.3.6
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01153 pctl0.77713
Details
Apache Answer: The link to reset the user's password will remain valid after sending a new link Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked. Users are recommended to upgrade to version 1.3.6, which fixes the issue.
Metadata
Created: 2024-08-12T15:30:50Z
Modified: 2025-03-13T21:39:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-gvpv-r32v-9737/GHSA-gvpv-r32v-9737.json
CWE IDs: ["CWE-772"]
Alternative ID: GHSA-gvpv-r32v-9737
Finding: F067
Auto approve: 1