CVE-2023-31139

CVSS v3 Score
7.5
High

Vulnerability Description

DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.37 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, Personal Access Tokens (PATs) generate unrestricted session cookies. This may lead to a bypass of other access restrictions (for example, based on allowed IP addresses or HTTP methods). DHIS2 implementers should upgrade to a supported version of DHIS2: 2.37.9.1, 2.38.3.1, or 2.39.1.2. Implementers can work around this issue by adding extra access control validations on a reverse proxy.

CVSS:7.5(High)

The NETGEAR genie application before 2.4.34 for Android is affected by mishandling of hard-coded API keys and session IDs.

CVSS:7.5(High)

The REST/JSON project 7.x-1.x for Drupal allows session name guessing, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.

CVSS:7.5(High)

It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible i...

CVSS:7.5(High)

In JetBrains TeamCity before 2019.2.1, the application state is kept alive after a user ends his session.

CVSS:7.5(High)

In JetBrains Space through 2020-04-22, the session timeout period was configured improperly.

CVSS:7.5(High)

Gophish through 0.10.1 does not invalidate the gophish cookie upon logout.