In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
References
Link | Resource |
---|---|
https://github.com/debiki/talkyard/commit/b0310df019887f3464895529c773bc7d85ddcf34 | Patch Third Party Advisory |
https://github.com/debiki/talkyard/commit/b0712915d8a22a20b09a129924e8a29c25ae5761 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 | Patch Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mend
Published: 2022-01-03T06:35:10
Updated: 2022-01-03T06:35:10
Reserved: 2021-01-22T00:00:00
Link: CVE-2021-25981
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-03T07:15:06.943
Modified: 2022-01-14T18:26:51.553
Link: CVE-2021-25981
JSON object: View
Redhat Information
No data.
CWE