CVE-2024-12667

A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
References
Link Resource
https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 Release Notes
https://vuldb.com/?ctiid.288536 Permissions Required VDB Entry
https://vuldb.com/?id.288536 Third Party Advisory VDB Entry
https://vuldb.com/?submit.449923 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*

History

19 Dec 2024, 15:10

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-16 20:15

Updated : 2024-12-19 15:10


NVD link : CVE-2024-12667

Mitre link : CVE-2024-12667

CVE.ORG link : CVE-2024-12667


JSON object : View

Products Affected

invoiceplane

  • invoiceplane
CWE
CWE-613

Insufficient Session Expiration