Pow is a authentication and user management solution for Phoenix and Plug-based apps. Starting in version 1.0.14 and prior to version 1.0.34, use of `Pow.Store.Backend.MnesiaCache` is susceptible to session hijacking as expired keys are not being invalidated correctly on startup. A session may expire when all `Pow.Store.Backend.MnesiaCache` instances have been shut down for a period that is longer than a session’s remaining TTL. Version 1.0.34 contains a patch for this issue. As a workaround, expired keys, including all expired sessions, can be manually invalidated..This CVE has a CVSS3.1 score of 6.5 and a Base Severity of MEDIUM.
Info | Details |
---|---|
CVE ID | CVE-2023-42446 |
CVE State | PUBLISHED |
BaseScore | 6.5 |
BaseSeverity | MEDIUM |
VectorString | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
Version | NA |
References for CVE-2023-42446 :
https://github.com/pow-auth/pow/security/advisories/GHSA-3cjh-p6pw-jhv9
https://github.com/pow-auth/pow/issues/713
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | LOW |
UserInteraction(UI) | NONE |
Scope(S) | UNCHANGED |
Confidentiality(C) | NONE |
Availability(A) | NONE |
Integrity(I) | HIGH |