Session Management Flaw in Mealie by HKotel
CVE-2022-34624

5.9MEDIUM

Key Information:

Vendor

Mealie

Status
Vendor
CVE Published:
19 August 2022

What is CVE-2022-34624?

The identified vulnerability in Mealie version 1.0.0beta3 arises from improper session management, where download tokens remain active even after a user logs out. This flaw allows attackers to exploit the session state and execute a man-in-the-middle attack by crafting specific GET requests. Consequently, unauthorized users could gain access to sensitive data and perform actions on behalf of legitimate users.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.