Geon is a board game based on solving questions about the Pythagorean Theorem. Malicious users can obtain the uuid from other users, spoof that uuid through the browser console and become co-owners of the target session. This issue is patched in version 1.1.0. No known workaround exists.
References
Link | Resource |
---|---|
https://github.com/math-geon/Geon/security/advisories/GHSA-4fv9-g2jh-j5xm | Third Party Advisory |
https://github.com/math-geon/Geon/releases/tag/v1.1.0 | Release Notes Third Party Advisory |
https://github.com/math-geon/Geon/commit/005456d752d5434b60026edbc83b2665b8557d19 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-03-24 14:15
Updated : 2022-03-31 12:49
NVD link : CVE-2022-24781
Mitre link : CVE-2022-24781
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
geon_project
- geon