Cal.com is open-source scheduling software. A vulnerability allows active sessions associated with an account to remain active even after enabling 2FA. When activating 2FA on a Cal.com account that is logged in on two or more devices, the account stays logged in on the other device(s) stays logged in without having to verify the account owner's identity. As of time of publication, no known patches or workarounds exist.
References
Link | Resource |
---|---|
https://github.com/calcom/cal.com/security/advisories/GHSA-cpf2-q635-xrwx | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-07-25T20:42:28.825Z
Updated: 2023-07-25T20:42:28.825Z
Reserved: 2023-07-10T17:51:29.612Z
Link: CVE-2023-37919
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-07-25T21:15:10.733
Modified: 2023-08-04T19:59:11.307
Link: CVE-2023-37919
JSON object: View
Redhat Information
No data.
CWE