alextselegidis/easyappointments is vulnerable to session fixation. The application does not generate a new ea_session
cookie after the user authenticates. A malicious user may create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session. If an attacker conducts this attack against an admin user, the attacker may escalate their privileges with the admin user being unaware.
This issue is patched in commit 7f37350fab9d729a9350d96369ff0f453cf7b840 and anticipated to be part of version 1.5.0.
{ "nvd_published_at": "2023-04-15T14:15:00Z", "github_reviewed_at": "2023-04-21T20:34:48Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-384" ] }