Lucene search

K
githubGitHub Advisory DatabaseGHSA-4QMM-CV4R-QFR4
HistoryApr 15, 2023 - 3:30 p.m.

alextselegidis/easyappointments Session Fixation vulnerability

2023-04-1515:30:14
CWE-384
GitHub Advisory Database
github.com
8
easyappointments
session fixation
vulnerability
authentication
cookie
injection
privilege escalation
patch
version 1.5.0
admin user

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.3%

alextselegidis/easyappointments is vulnerable to session fixation. The application does not generate a new ea_session cookie after the user authenticates. A malicious user may create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user’s account through the active session. If an attacker conducts this attack against an admin user, the attacker may escalate their privileges with the admin user being unaware.

This issue is patched in commit 7f37350fab9d729a9350d96369ff0f453cf7b840 and anticipated to be part of version 1.5.0.

Affected configurations

Vulners
Node
alextselegidiseasyappointmentsRange1.4.3
VendorProductVersionCPE
alextselegidiseasyappointments*cpe:2.3:a:alextselegidis:easyappointments:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

61.3%