In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
Solution:
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Link | Tags |
---|---|
https://github.com/debiki/talkyard/commit/b0310df019887f3464895529c773bc7d85ddcf34 | third party advisory patch |
https://github.com/debiki/talkyard/commit/b0712915d8a22a20b09a129924e8a29c25ae5761 | third party advisory patch |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25981 | patch third party advisory vdb entry |