Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1yNzZ3LTN3d3EtanY2ds4AAx9R

Insufficient Session Expiration in pretix

rami.io pretix before 4.17.1 allows OAuth application authorization from a logged-out session. The fixed versions are 4.15.1, 4.16.1, and 4.17.1.

Permalink: https://github.com/advisories/GHSA-r76w-3wwq-jv6v
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yNzZ3LTN3d3EtanY2ds4AAx9R
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: over 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-r76w-3wwq-jv6v, CVE-2023-27891
References: Blast Radius: 6.8

Affected Packages

pypi:pretix
Dependent packages: 2
Dependent repositories: 8
Downloads: 1,807 last month
Affected Version Ranges: < 4.15.1, >= 4.16.0, < 4.16.1, >= 4.17.0, < 4.17.1
Fixed in: 4.15.1, 4.16.1, 4.17.1
All affected versions: 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.2.2, 1.3.0, 1.3.1, 1.4.0, 1.4.1, 1.5.0, 1.5.1, 1.5.2, 1.6.0, 1.6.1, 1.6.2, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.10.0, 1.10.1, 1.11.0, 1.11.1, 1.12.0, 1.12.1, 1.13.0, 1.13.1, 1.14.0, 1.15.0, 1.15.1, 1.15.2, 1.16.0, 1.17.0, 1.17.1, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.6.0, 2.7.0, 2.7.1, 2.7.2, 2.8.2, 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.9.0, 3.10.0, 3.11.0, 3.11.1, 3.12.0, 3.12.1, 3.13.0, 3.13.1, 3.14.0, 3.14.1, 3.14.2, 3.15.0, 3.16.0, 3.17.1, 3.17.2, 3.18.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.3.1, 4.4.0, 4.4.1, 4.5.0, 4.5.1, 4.5.2, 4.6.0, 4.6.1, 4.7.0, 4.7.1, 4.8.0, 4.9.0, 4.9.1, 4.10.0, 4.10.1, 4.11.0, 4.11.1, 4.12.0, 4.13.0, 4.13.1, 4.14.0, 4.15.0, 4.16.0, 4.17.0
All unaffected versions: 4.15.1, 4.16.1, 4.17.1, 4.18.0, 4.18.1, 4.18.2, 4.19.0, 4.20.0, 4.20.1, 4.20.4, 2023.6.0, 2023.6.1, 2023.6.3, 2023.7.0, 2023.7.1, 2023.7.3, 2023.8.0, 2023.8.1, 2023.9.0, 2023.9.1, 2023.10.0, 2023.10.2, 2024.1.0, 2024.1.1, 2024.2.0, 2024.3.0, 2024.4.0, 2024.5.0