alextselegidis/easyappointments Session Fixation vulnerability
Moderate severity
GitHub Reviewed
Published
Apr 15, 2023
to the GitHub Advisory Database
•
Updated Apr 21, 2023
Description
Published by the National Vulnerability Database
Apr 15, 2023
Published to the GitHub Advisory Database
Apr 15, 2023
Reviewed
Apr 21, 2023
Last updated
Apr 21, 2023
alextselegidis/easyappointments is vulnerable to session fixation. The application does not generate a new
ea_session
cookie after the user authenticates. A malicious user may create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session. If an attacker conducts this attack against an admin user, the attacker may escalate their privileges with the admin user being unaware.This issue is patched in commit 7f37350fab9d729a9350d96369ff0f453cf7b840 and anticipated to be part of version 1.5.0.
References