{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-37919","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-07-10T17:51:29.612Z","datePublished":"2023-07-25T20:42:28.825Z","dateUpdated":"2024-10-16T19:45:12.080Z"},"containers":{"cna":{"title":"Cal.com not expiring old sessions after enabling 2FA","problemTypes":[{"descriptions":[{"cweId":"CWE-613","lang":"en","description":"CWE-613: Insufficient Session Expiration","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/calcom/cal.com/security/advisories/GHSA-cpf2-q635-xrwx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/calcom/cal.com/security/advisories/GHSA-cpf2-q635-xrwx"}],"affected":[{"vendor":"calcom","product":"cal.com","versions":[{"version":"<= 3.1.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-07-25T20:42:28.825Z"},"descriptions":[{"lang":"en","value":"Cal.com is open-source scheduling software. A vulnerability allows active sessions associated with an account to remain active even after enabling 2FA. When activating 2FA on a Cal.com account that is logged in on two or more devices, the account stays logged in on the other device(s) stays logged in without having to verify the account owner's identity. As of time of publication, no known patches or workarounds exist."}],"source":{"advisory":"GHSA-cpf2-q635-xrwx","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:23:27.790Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/calcom/cal.com/security/advisories/GHSA-cpf2-q635-xrwx","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/calcom/cal.com/security/advisories/GHSA-cpf2-q635-xrwx"}]},{"affected":[{"vendor":"cal","product":"cal.com","cpes":["cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.1.4","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-16T19:02:55.165070Z","id":"CVE-2023-37919","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-16T19:45:12.080Z"}}]}}