CVE-2024-29023

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29023
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-29023.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-29023
Related
  • GHSA-xmc6-cfq5-hg39
Published
2024-04-12T21:15:11Z
Modified
2025-01-15T05:12:15.463592Z
Summary
[none]
Details

Xibo is an Open Source Digital Signage platform with a web content management system and Windows display player software. Session tokens are exposed in the return of session search API call on the sessions page. Subsequently they can be exfiltrated and used to hijack a session. Users must be granted access to the session page, or be a super admin. Users should upgrade to version 3.3.10 or 4.0.9 which fix this issue. Customers who host their CMS with the Xibo Signage service have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running. Patches are available for earlier versions of Xibo CMS that are out of security support: 2.3 patch ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff. 1.8 patch a81044e6ccdd92cc967e34c125bd8162432e51bc.diff. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/dasgarner/xibo-cms

Affected ranges

Type
GIT
Repo
https://github.com/dasgarner/xibo-cms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/xibosignage/xibo-cms
Events

Affected versions

1.*

1.6.0-rc1
1.7.0
1.7.0-alpha
1.7.0-alpha2
1.7.1
1.7.2
1.7.3
1.7.4
1.8.0
1.8.0-alpha
1.8.0-alpha2
1.8.0-alpha3
1.8.0-beta
1.8.0-rc1
1.8.0-rc2
1.8.0-rc3
1.8.1
1.8.10
1.8.11
1.8.12
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.8.7
1.8.8
1.8.9

2.*

2.0.0
2.0.0-alpha1
2.0.0-beta
2.0.0-beta.2
2.0.0-rc1
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.1.0
2.1.0-alpha1
2.1.0-alpha2
2.1.0-beta
2.1.0-rc1
2.1.1
2.1.2
2.2.0
2.2.0-alpha
2.2.0-alpha2
2.2.0-beta
2.2.0-rc1
2.2.1
2.2.2
2.2.3
2.3.0
2.3.0-alpha
2.3.0-beta
2.3.0-rc1
2.3.1
2.3.10
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9

3.*

3.0.0
3.0.0-alpha
3.0.0-alpha2
3.0.0-alpha3
3.0.0-beta
3.0.0-rc1
3.0.0-rc2
3.0.0-rc3
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.1.0
3.1.0-alpha
3.1.0-beta
3.1.1
3.1.2
3.1.3
3.1.4
3.2.0
3.2.1
3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9

4.*

4.0.0
4.0.0-alpha
4.0.0-alpha2
4.0.0-beta
4.0.0-rc1
4.0.0-rc2