{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-31065","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2023-04-24T03:18:40.102Z","datePublished":"2023-05-22T15:40:56.183Z","dateUpdated":"2024-10-09T17:18:40.599Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache InLong","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"1.6.0","status":"affected","version":"1.4.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"lujie.ac.cn"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.<p>This issue affects Apache InLong: from 1.4.0 through 1.6.0.&nbsp;\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">An old session can be used by an attacker even after the user has been deleted or the password has been changed.</span>\n\n\nUsers are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/apache/inlong/pull/7836\">https://github.com/apache/inlong/pull/7836</a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/apache/inlong/pull/7884\">https://github.com/apache/inlong/pull/7884</a> to solve it.\n\n<br></p>"}],"value":"Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. \n\n\nAn old session can be used by an attacker even after the user has been deleted or the password has been changed.\n\n\nUsers are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick  https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 ,  https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884  to solve it.\n\n\n\n\n"}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-613","description":"CWE-613 Insufficient Session Expiration","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-05-22T15:40:56.183Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/to7o0n2cks0omtwo6mhh5cs2vfdbplqf"}],"source":{"discovery":"UNKNOWN"},"title":"Apache InLong: Insufficient Session Expiration in InLong","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:45:25.116Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/to7o0n2cks0omtwo6mhh5cs2vfdbplqf"}]},{"affected":[{"vendor":"apache","product":"inlong","cpes":["cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.4.0","status":"affected","lessThanOrEqual":"1.6.0","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.1,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-09T17:17:58.413780Z","id":"CVE-2023-31065","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-09T17:18:40.599Z"}}]}}