Lucene search

K
cvelistMendCVELIST:CVE-2021-25966
HistoryOct 10, 2021 - 9:45 a.m.

CVE-2021-25966 Orchard Core CMS - Improper Session Termination after Password Change

2021-10-1009:45:11
CWE-613
Mend
www.cve.org
2
cve-2021-25966; orchard core cms; session termination; password change

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

40.9%

In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.

CNA Affected

[
  {
    "product": "Users",
    "vendor": "OrchardCore",
    "versions": [
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "1.0.0-beta1-3383",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "1.0.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

40.9%

Related for CVELIST:CVE-2021-25966