In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
References
Link | Resource |
---|---|
https://github.com/debiki/talkyard/commit/b0310df019887f3464895529c773bc7d85ddcf34 | Patch Third Party Advisory |
https://github.com/debiki/talkyard/commit/b0712915d8a22a20b09a129924e8a29c25ae5761 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 | Patch Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2022-01-03 07:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-25981
Mitre link : CVE-2021-25981
CVE.ORG link : CVE-2021-25981
JSON object : View
Products Affected
talkyard
- talkyard
CWE
CWE-613
Insufficient Session Expiration