First published: Tue Feb 28 2023(Updated: )
From issue: Problem description Currently, the refresh token is valid indefinitely. This is bad security practice. Desired solution The refresh token should get a validity of 24-48 hours. Additional context When implementing this, also check that the refresh token returns a new refresh token When implementing this, also adapt the UI so that it logs out if refresh token is no longer valid. When implementing this, ensure that nodes refresh their token periodically so that they do not have to be restarted manually. ### Impact ### Patches None available ### Workarounds None available
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6 | <3.8.0 | 3.8.0 |
Vantage6 | <3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-23929.
The severity of CVE-2023-23929 is high, with a severity value of 8.8.
The affected software is Vantage6 version up to exclusive 3.8.0.
To fix CVE-2023-23929, update to version 3.8.0 or higher of Vantage6.
More information about CVE-2023-23929 can be found at the following references: [Reference 1](https://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8) and [Reference 2](https://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp).