icon

We found results for “

CVE-2021-25966

Date: October 10, 2021

Overview

In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.

Details

The “Calibre-web” application is vulnerable to “Cross site request forgery”. By forcing an authenticated user to submit a request , it is possible to create a new user role with admin privileges.

PoC Details

For demonstration purposes we will use two users:
1. Alice, a user of the application.
2. Admin, an administrator user.
Login into the application as Alice, and in another browser login in as Admin.
As Admin, navigate to the “Users”' tab under the “Security” section on the left panel. You can see Alice listed there. Press on “Edit Password” for Alice, and change the password.
Meanwhile, Alice is connected on a different browser, and can still access the account and perform some actions (upload pages, etc..) even after the password has been changed.

Affected Environments

OrchardCore versions versions 1.0.0-beta1-3383 to 1.0.0

Remediation

Make sure the current session of a user gets invalidated when their password is changed, and cannot be reused.

Prevention

No fix was provided by the maintainer.

Language: C#

Good to know:

icon
icon

Insufficient Session Expiration

CWE-613
icon

Upgrade Version

No fix version available

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope (S): Unchanged
Confidentiality (C): High
Integrity (I): High
Availability (A): High
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (AU): Single
Confidentiality (C): Partial
Integrity (I): Partial
Availability (A): Partial
Additional information: