In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.
References
Link | Resource |
---|---|
https://github.com/OrchardCMS/OrchardCore/blob/v1.0.0/src/OrchardCore.Modules/OrchardCore.Users/Controllers/ResetPasswordController.cs#L123 | Exploit Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25966 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mend
Published: 2021-10-06T00:00:00
Updated: 2021-10-10T09:45:11
Reserved: 2021-01-22T00:00:00
Link: CVE-2021-25966
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-10-10T10:15:07.270
Modified: 2022-02-25T16:10:26.793
Link: CVE-2021-25966
JSON object: View
Redhat Information
No data.
CWE