CVE-2017-1000136 - Insufficient Session Expiration

Severity

43%

Complexity

86%

Confidentiality

48%

Mahara 1.8 before 1.8.6 and 1.9 before 1.9.4 and 1.10 before 1.10.1 and 15.04 before 15.04.0 are vulnerable to old sessions not being invalidated after a password change.

Mahara 1.8 before 1.8.6 and 1.9 before 1.9.4 and 1.10 before 1.10.1 and 15.04 before 15.04.0 are vulnerable to old sessions not being invalidated after a password change.

CVSS 3.0 Base Score 6.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).

Demo Examples

Insufficient Session Expiration

CWE-613

The following snippet was taken from a J2EE web.xml deployment descriptor in which the session-timeout parameter is explicitly defined (the default value depends on the container). In this case the value is set to -1, which means that a session will never expire.


               
</web-app>
</session-config>
<session-timeout>-1</session-timeout>

Overview

Type

Mahara

First reported 7 years ago

2017-11-03 18:29:00

Last updated 7 years ago

2017-11-15 13:58:00

Affected Software

Mahara 1.8 Release Candidate 1

1.8

Mahara 1.8 Release Candidate 2

1.8

Mahara 1.8.0

1.8.0

Mahara 1.8.1

1.8.1

Mahara 1.8.2

1.8.2

Mahara 1.8.3

1.8.3

Mahara 1.8.4

1.8.4

Mahara 1.8.5

1.8.5

Mahara 1.9 Release Candidate 1

1.9

Mahara 1.9.0

1.9.0

Mahara 1.9.1

1.9.1

Mahara 1.9.2

1.9.2

Mahara 1.9.3

1.9.3

Mahara 1.10 Release Candidate 1

1.10

Mahara 1.10.0

1.10.0

Mahara 15.04 Release Candidate 1

15.04

Mahara 15.04 Release Candidate 2

15.04

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.