CVE-2023-42446

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-42446
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-42446.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-42446
Aliases
Withdrawn
2024-05-15T05:32:14.956462Z
Published
2023-09-18T22:15:47Z
Modified
2023-11-29T10:15:40.909165Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Pow is a authentication and user management solution for Phoenix and Plug-based apps. Starting in version 1.0.14 and prior to version 1.0.34, use of Pow.Store.Backend.MnesiaCache is susceptible to session hijacking as expired keys are not being invalidated correctly on startup. A session may expire when all Pow.Store.Backend.MnesiaCache instances have been shut down for a period that is longer than a session's remaining TTL. Version 1.0.34 contains a patch for this issue. As a workaround, expired keys, including all expired sessions, can be manually invalidated.

References

Affected packages

Git / github.com/danschultzer/pow

Affected ranges

Type
GIT
Repo
https://github.com/danschultzer/pow
Events
Type
GIT
Repo
https://github.com/pow-auth/pow
Events

Affected versions

v1.*

v1.0.14
v1.0.15
v1.0.16
v1.0.17
v1.0.18
v1.0.19
v1.0.20
v1.0.21
v1.0.22
v1.0.23
v1.0.24
v1.0.25
v1.0.26
v1.0.27
v1.0.28
v1.0.29
v1.0.30
v1.0.31
v1.0.32
v1.0.33