A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
References
Link | Resource |
---|---|
https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 | Release Notes |
https://vuldb.com/?ctiid.288536 | Permissions Required VDB Entry |
https://vuldb.com/?id.288536 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.449923 | Third Party Advisory VDB Entry |
Configurations
History
19 Dec 2024, 15:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 - Release Notes | |
References | () https://vuldb.com/?ctiid.288536 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.288536 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.449923 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:* | |
First Time |
Invoiceplane
Invoiceplane invoiceplane |
|
Summary |
|
16 Dec 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-16 20:15
Updated : 2024-12-19 15:10
NVD link : CVE-2024-12667
Mitre link : CVE-2024-12667
CVE.ORG link : CVE-2024-12667
JSON object : View
Products Affected
invoiceplane
- invoiceplane
CWE
CWE-613
Insufficient Session Expiration