An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout.
                
            References
                    | Link | Resource | 
|---|---|
| https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ | Exploit Third Party Advisory | 
| https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/ - Exploit, Third Party Advisory | 
Information
                Published : 2022-12-25 05:15
Updated : 2025-04-15 14:15
NVD link : CVE-2022-44017
Mitre link : CVE-2022-44017
CVE.ORG link : CVE-2022-44017
JSON object : View
Products Affected
                simmeth
- lieferantenmanager
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
