Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
User sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, which fixes the issue.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/08/09/4 | |
| https://lists.apache.org/thread/j7c080xj31x8rvz1pyk2h47rdd9pwbv9 | Mailing List Vendor Advisory |
Configurations
History
13 Mar 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References |
|
29 Aug 2024, 12:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.apache.org/thread/j7c080xj31x8rvz1pyk2h47rdd9pwbv9 - Mailing List, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
| First Time |
Apache
Apache answer |
12 Aug 2024, 13:41
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-12 13:38
Updated : 2025-03-13 19:15
NVD link : CVE-2024-41890
Mitre link : CVE-2024-41890
JSON object : View
Products Affected
apache
- answer
CWE
No CWE.
