Pow is a authentication and user management solution for Phoenix and Plug-based apps. Starting in version 1.0.14 and prior to version 1.0.34, use of `Pow.Store.Backend.MnesiaCache` is susceptible to session hijacking as expired keys are not being invalidated correctly on startup. A session may expire when all `Pow.Store.Backend.MnesiaCache` instances have been shut down for a period that is longer than a session's remaining TTL. Version 1.0.34 contains a patch for this issue. As a workaround, expired keys, including all expired sessions, can be manually invalidated.
References
Link | Resource |
---|---|
https://github.com/pow-auth/pow/issues/713 | Exploit Issue Tracking |
https://github.com/pow-auth/pow/security/advisories/GHSA-3cjh-p6pw-jhv9 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-09-18 22:15
Updated : 2023-09-22 14:21
NVD link : CVE-2023-42446
Mitre link : CVE-2023-42446
CVE.ORG link : CVE-2023-42446
JSON object : View
Products Affected
powauth
- pow