DomainMOD domainmod-v4.15.0 is affected by an insufficient session expiration vulnerability. On changing a password, both sessions using the changed password and old sessions in any other browser or device do not expire and remain active. Such flaws frequently give attackers unauthorized access to some system data or functionality.
References
Link | Resource |
---|---|
https://gist.github.com/anku-agar/0fec2ffd98308e550ce9b5d4b395d0d7 | Exploit Third Party Advisory |
https://gist.github.com/anku-agar/0fec2ffd98308e550ce9b5d4b395d0d7 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/anku-agar/0fec2ffd98308e550ce9b5d4b395d0d7 - Exploit, Third Party Advisory |
Information
Published : 2021-03-15 12:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35358
Mitre link : CVE-2020-35358
CVE.ORG link : CVE-2020-35358
JSON object : View
Products Affected
domainmod
- domainmod
CWE
CWE-613
Insufficient Session Expiration