Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.
References
Link | Resource |
---|---|
https://linotp.org/CVE-2023-49706.txt | Vendor Advisory |
https://linotp.org/security-update-linotp3-selfservice.html | Vendor Advisory |
https://www.linotp.org/news.html | Vendor Advisory |
https://linotp.org/CVE-2023-49706.txt | Vendor Advisory |
https://linotp.org/security-update-linotp3-selfservice.html | Vendor Advisory |
https://www.linotp.org/news.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-12-19 19:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49706
Mitre link : CVE-2023-49706
CVE.ORG link : CVE-2023-49706
JSON object : View
Products Affected
linotp
- virtual_appliance
- linotp
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')