Skip to content

OctoPrint vulnerable to Insufficient Session Expiration.

Moderate severity GitHub Reviewed Published Sep 22, 2022 to the GitHub Advisory Database • Updated Jan 31, 2023

Package

pip OctoPrint (pip)

Affected versions

< 1.8.3

Patched versions

1.8.3

Description

If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists. This issue is fixed in version 1.8.3.

References

Published by the National Vulnerability Database Sep 21, 2022
Published to the GitHub Advisory Database Sep 22, 2022
Reviewed Sep 23, 2022
Last updated Jan 31, 2023

Severity

Moderate
4.4
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2022-2888

GHSA ID

GHSA-937f-qh3w-6g87

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.