CVE-2023-31139

DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.37 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, Personal Access Tokens (PATs) generate unrestricted session cookies. This may lead to a bypass of other access restrictions (for example, based on allowed IP addresses or HTTP methods). DHIS2 implementers should upgrade to a supported version of DHIS2: 2.37.9.1, 2.38.3.1, or 2.39.1.2. Implementers can work around this issue by adding extra access control validations on a reverse proxy.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*
cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*
cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-05-09 15:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-31139

Mitre link : CVE-2023-31139

CVE.ORG link : CVE-2023-31139


JSON object : View

Products Affected

dhis2

  • dhis_2
CWE
CWE-613

Insufficient Session Expiration