Miggo Logo

CVE-2022-2997:
Insufficient Session Expiration in snipe/snipe-it

4.6

CVSS Score
3.0

Basic Information

EPSS Score
0.74219%
Published
8/26/2022
Updated
1/29/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
snipe/snipe-itcomposer< 6.0.106.0.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient session expiration after password changes. The key function is passwordSave in ProfileController.php where password updates were processed without session termination. The patch added Auth::logoutOtherDevices() to address this. The absence of session invalidation logic in this function directly enabled session fixation attacks. The middleware addition in Kernel.php (AuthenticateSession) supports session management but the primary vulnerability root is in the password change handler.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S*ssion *ix*tion in *it*u* r*pository snip*/snip*-it prior to v*rsion *.*.**. T** s*ssion is not inv*li**t** **t*r * p*sswor* ***n**.

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt s*ssion *xpir*tion **t*r p*sswor* ***n**s. T** k*y *un*tion is `p*sswor*S*v*` in `Pro*il**ontroll*r.p*p` w**r* p*sswor* up**t*s w*r* pro**ss** wit*out s*ssion t*rmin*tion. T** p*t** ***** `*ut*::lo*outOt**r**