Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50765208b27d | Patch |
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x | Exploit Vendor Advisory |
Configurations
History
30 Oct 2023, 18:03
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50765208b27d - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.8 |
First Time |
Engelsystem engelsystem
Engelsystem |
|
CPE | cpe:2.3:a:engelsystem:engelsystem:*:*:*:*:*:*:*:* |
17 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-17 00:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-45659
Mitre link : CVE-2023-45659
CVE.ORG link : CVE-2023-45659
JSON object : View
Products Affected
engelsystem
- engelsystem
CWE
CWE-613
Insufficient Session Expiration