Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. sylius/sylius
  4. ›
  5. CVE-2022-24743

CVE-2022-24743: Insufficient Session Expiration

March 14, 2022 (updated March 22, 2022)

Sylius is an open source eCommerce platform. Prior to versions 1.10.11 and 1.11.2, the reset password token was not set to null after the password was changed. The same token could be used several times, which could result in leak of the existing token and unauthorized password change. The issue is fixed in versions 1.10.11 and 1.11.2. As a workaround, overwrite the Sylius\Bundle\ApiBundle\CommandHandler\ResetPasswordHandler class with code provided by the maintainers and register it in a container. More information about this workaround is available in the GitHub Security Advisory.

References

  • github.com/Sylius/Sylius/releases/tag/v1.10.11
  • github.com/Sylius/Sylius/releases/tag/v1.11.2
  • github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g
  • github.com/advisories/GHSA-mf3v-f2qq-pf9g
  • nvd.nist.gov/vuln/detail/CVE-2022-24743

Code Behaviors & Features

Detect and mitigate CVE-2022-24743 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.10.0 before 1.10.11, all versions starting from 1.11.0 before 1.11.2

Fixed versions

  • 1.10.11
  • 1.11.2

Solution

Upgrade to versions 1.10.11, 1.11.2 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

packagist/sylius/sylius/CVE-2022-24743.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:45 +0000.