Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50765208b27d | Patch |
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-10-17 00:15
Updated : 2023-10-30 18:03
NVD link : CVE-2023-45659
Mitre link : CVE-2023-45659
CVE.ORG link : CVE-2023-45659
JSON object : View
Products Affected
engelsystem
- engelsystem
CWE
CWE-613
Insufficient Session Expiration