CVE Vulnerabilities

CVE-2021-37156

Insufficient Session Expiration

Published: Aug 05, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the users account, but the intended behavior is for those sessions to be terminated.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
RedmineRedmine4.2.0 (including)4.2.0 (including)
RedmineRedmine4.2.1 (including)4.2.1 (including)
RedmineUbuntubionic*
RedmineUbuntufocal*
RedmineUbuntukinetic*
RedmineUbuntulunar*
RedmineUbuntumantic*
RedmineUbuntutrusty*
RedmineUbuntuxenial*

Potential Mitigations

References