Lucene search

K
cve[email protected]CVE-2023-28131
HistoryApr 24, 2023 - 5:15 a.m.

CVE-2023-28131

2023-04-2405:15:08
CWE-522
web.nvd.nist.gov
19
vulnerability
expo.io
account takeover
credential theft
nvd
cve-2023-28131

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the β€œExpo AuthSession Redirect Proxy” for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc).

Affected configurations

NVD
Node
expoexpo_software_development_kitRange45.0.0–48.0.0

CNA Affected

[
  {
    "vendor": "Expo.io",
    "product": "Expo AuthSession module",
    "versions": [
      {
        "version": "All versions prior to SDK 48.* (Affected SDK 45.*, 46.* and 47.*)",
        "status": "affected"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.8%

Related for CVE-2023-28131