CVE-2023-31139

Source
https://cve.org/CVERecord?id=CVE-2023-31139
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-31139.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-31139
Aliases
  • GHSA-44g3-9mp4-prv3
Published
2023-05-09T14:27:22.658Z
Modified
2025-12-20T02:51:59.611323Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
DHIS2 Core unrestricted session cookies with Personal Access Tokens
Details

DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.37 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, Personal Access Tokens (PATs) generate unrestricted session cookies. This may lead to a bypass of other access restrictions (for example, based on allowed IP addresses or HTTP methods). DHIS2 implementers should upgrade to a supported version of DHIS2: 2.37.9.1, 2.38.3.1, or 2.39.1.2. Implementers can work around this issue by adding extra access control validations on a reverse proxy.

Database specific
{
    "cwe_ids": [
        "CWE-613"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/31xxx/CVE-2023-31139.json"
}
References

Affected packages

Git / github.com/dhis2/dhis2-core

Affected ranges

Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.37"
        },
        {
            "fixed": "2.37.9.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.38"
        },
        {
            "fixed": "2.38.3.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.39"
        },
        {
            "fixed": "2.39.1.2"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-31139.json"