In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a user’s session even after the user initiated logout. It makes it possible for an attacker to reuse the admin cookies either via local/network access or by other hypothetical attacks.
References
Link | Resource |
---|---|
https://github.com/ifmeorg/ifme/commit/014f6d3526a594109d4d6607c2f30b1865e37611 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 | Exploit Third Party Advisory |
https://github.com/ifmeorg/ifme/commit/014f6d3526a594109d4d6607c2f30b1865e37611 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ifmeorg/ifme/commit/014f6d3526a594109d4d6607c2f30b1865e37611 - Patch, Third Party Advisory | |
References | () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25992 - Exploit, Third Party Advisory |
Information
Published : 2022-02-10 10:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25992
Mitre link : CVE-2021-25992
CVE.ORG link : CVE-2021-25992
JSON object : View
Products Affected
if-me
- ifme
CWE
CWE-613
Insufficient Session Expiration