Overview
- Description
- Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.8
- Impact score
- 5.2
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-362
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:linotp:linotp:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFFA1A9F-16EA-4923-A86A-709DA8A48692", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:linotp:virtual_appliance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DED984BA-D885-4B29-A1F9-92AFE193DAD1", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.0.0" } ], "operator": "OR" } ] } ]