// For flags

CVE-2022-24743

Insufficient Session Expiration in Sylius

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sylius is an open source eCommerce platform. Prior to versions 1.10.11 and 1.11.2, the reset password token was not set to null after the password was changed. The same token could be used several times, which could result in leak of the existing token and unauthorized password change. The issue is fixed in versions 1.10.11 and 1.11.2. As a workaround, overwrite the `Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler` class with code provided by the maintainers and register it in a container. More information about this workaround is available in the GitHub Security Advisory.

Sylius es una plataforma de comercio electrónico de código abierto. En versiones anteriores a 1.10.11 y 1.11.2, el token de restablecimiento de contraseña no se establecía como nulo después de cambiar la contraseña. El mismo token podía ser usado varias veces, lo que podía resultar en un filtrado del token existente y a un cambio de contraseña no autorizado. El problema ha sido corregido en versiones 1.10.11 y 1.11.2. Como medida de mitigación, sobrescriba la clase "Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler" con el código proporcionado por los mantenedores y regístrela en un contenedor. Más información sobre esta medida de mitigación está disponible en el aviso de seguridad de GitHub

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-10 CVE Reserved
  • 2022-03-14 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-10-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-613: Insufficient Session Expiration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.10.0 < 1.10.11
Search vendor "Sylius" for product "Sylius" and version " >= 1.10.0 < 1.10.11"
-
Affected
Sylius
Search vendor "Sylius"
Sylius
Search vendor "Sylius" for product "Sylius"
>= 1.11.0 < 1.11.2
Search vendor "Sylius" for product "Sylius" and version " >= 1.11.0 < 1.11.2"
-
Affected