### [CVE-2023-45659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45659) ![](https://img.shields.io/static/v1?label=Product&message=engelsystem&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20dbb089315ff3d%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-613%3A%20Insufficient%20Session%20Expiration&color=brighgreen) ### Description Engelsystem is a shift planning system for chaos events. If a users' password is compromised and an attacker gained access to a users' account, i.e., logged in and obtained a session, an attackers' session is not terminated if the users' account password is reset. This vulnerability has been fixed in the commit `dbb089315ff3d`. Users are advised to update their installations. There are no known workarounds for this vulnerability. ### POC #### Reference - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x #### Github - https://github.com/sev-hack/sev-hack