Home

Description

LDAP Tool Box Self Service Password 1.5.2 contains a password reset vulnerability that allows attackers to manipulate HTTP Host headers during token generation. Attackers can craft malicious password reset requests that generate tokens sent to a controlled server, enabling potential account takeover by intercepting and using stolen reset tokens.

PUBLISHED Reserved 2025-12-19 | Published 2025-12-19 | Updated 2025-12-19 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Weak Password Recovery Mechanism for Forgotten Password

Product status

1.5.2
affected

Credits

Tahar BENNACEF (aka tar.gz) finder

References

www.exploit-db.com/exploits/51275 (ExploitDB-51275) exploit

github.com/ltb-project/self-service-password (Official Product Homepage) product

www.vulncheck.com/...d-account-takeover-via-http-host-header (VulnCheck Advisory: LDAP Tool Box Self Service Password 1.5.2 Account Takeover via HTTP Host Header) third-party-advisory

cve.org (CVE-2023-53958)

nvd.nist.gov (CVE-2023-53958)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.