In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
Advisories
Source ID Title
EUVD EUVD EUVD-2021-12808 In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
Fixes

Solution

Upgrade to version v0.2021.35


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published:

Updated: 2024-08-03T20:19:19.390Z

Reserved: 2021-01-22T00:00:00

Link: CVE-2021-25981

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-03T07:15:06.943

Modified: 2024-11-21T05:55:43.607

Link: CVE-2021-25981

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.