Vulnerability Description
Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Engelsystem | Engelsystem | < 2023-09-18 |
Related Weaknesses (CWE)
References
- https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50Patch
- https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jmExploitVendor Advisory
- https://github.com/engelsystem/engelsystem/commit/dbb089315ff3d8aabc11445e78fb50Patch
- https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jmExploitVendor Advisory
FAQ
What is CVE-2023-45659?
CVE-2023-45659 is a vulnerability with a CVSS score of 3.6 (LOW). Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' s...
How severe is CVE-2023-45659?
CVE-2023-45659 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45659?
Check the references section above for vendor advisories and patch information. Affected products include: Engelsystem Engelsystem.