|
Message-ID: <f9917150-55d3-d094-1460-a88cd28b3ecd@apache.org> Date: Fri, 12 May 2023 01:16:56 +0000 From: Maxim Solodovnik <solomax@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-29032: Apache OpenMeetings: allows bypass authentication Severity: important Affected versions: - Apache OpenMeetings 3.1.3 before 7.1.0 Description: An attacker that has gained access to certain private information can use this to act as other user. Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 3.1.3 before 7.1.0 This issue is being tracked as OPENMEETINGS-2764 Credit: Stefan Schiller (reporter) References: https://openmeetings.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-29032 https://issues.apache.org/jira/browse/OPENMEETINGS-2764
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.