Lucene search

K
cvelistRapid7CVELIST:CVE-2019-5647
HistoryAug 20, 2019 - 12:00 a.m.

CVE-2019-5647 Rapid7 AppSpider Chrome Plugin Insufficient Session Expiration

2019-08-2000:00:00
CWE-613
rapid7
www.cve.org

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

12.7%

The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215.

CNA Affected

[
  {
    "product": "AppSpider",
    "vendor": "Rapid7",
    "versions": [
      {
        "lessThanOrEqual": "3.8.213",
        "status": "affected",
        "version": "3.8.213",
        "versionType": "custom"
      }
    ]
  }
]

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

12.7%

Related for CVELIST:CVE-2019-5647