Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50765208b27d | Patch |
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-16T23:32:57.929Z
Updated: 2023-10-16T23:32:57.929Z
Reserved: 2023-10-10T14:36:40.859Z
Link: CVE-2023-45659
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-17T00:15:11.233
Modified: 2023-10-30T18:03:57.393
Link: CVE-2023-45659
JSON object: View
Redhat Information
No data.
CWE