{"id":"CVE-2022-2888","summary":"Insufficient Session Expiration in octoprint/octoprint","details":"If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists.","aliases":["GHSA-937f-qh3w-6g87","PYSEC-2022-282"],"modified":"2026-04-14T04:09:19.974953Z","published":"2022-09-21T11:25:08Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2888.json","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"fixed":"1.8.3"}]}],"cna_assigner":"@huntrdev","cwe_ids":["CWE-613"]},"references":[{"type":"WEB","url":"https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2888.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2888"},{"type":"FIX","url":"https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/OctoPrint/OctoPrint","events":[{"introduced":"0"},{"fixed":"d0d226f3e0ad0a6436e4f32519bf38a82aa576ca"}],"database_specific":{"cpe":"cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"1.8.3"}]}}],"versions":["1.1.0-dev","1.2.0","1.2.0-dev","1.2.0-rc1","1.2.0-rc2","1.2.0-rc3","1.2.1","1.2.10","1.2.11","1.2.12","1.2.13","1.2.14","1.2.15","1.2.16","1.2.16rc1","1.2.16rc2","1.2.17rc1","1.2.17rc2","1.2.17rc3","1.2.18","1.2.18rc1","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.2.7","1.2.8","1.2.9","1.4.0rc1","1.4.0rc2","1.4.0rc3","1.4.0rc4","1.4.0rc5","1.4.0rc6","1.5.0","1.5.0rc1","1.5.0rc2","1.5.0rc3","1.5.1","1.5.2","1.5.3","1.6.1","1.7.1","1.7.2","1.7.3","1.8.0","1.8.1","1.8.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2888.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/octoprint/octoprint","events":[{"introduced":"0"},{"fixed":"40e6217ac1a85cc5ed592873ae49db01d3005da4"}],"database_specific":{"source":"REFERENCES"}}],"versions":["1.1.0-dev","1.2.0","1.2.0-dev","1.2.0-rc1","1.2.0-rc2","1.2.0-rc3","1.2.1","1.2.10","1.2.11","1.2.12","1.2.13","1.2.14","1.2.15","1.2.16","1.2.16rc1","1.2.16rc2","1.2.17rc1","1.2.17rc2","1.2.17rc3","1.2.18","1.2.18rc1","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.2.7","1.2.8","1.2.9","1.4.0rc1","1.4.0rc2","1.4.0rc3","1.4.0rc4","1.4.0rc5","1.4.0rc6","1.5.0","1.5.0rc1","1.5.0rc2","1.5.0rc3","1.5.1","1.5.2","1.5.3","1.6.1","1.7.1","1.7.2","1.7.3","1.8.0","1.8.1","1.8.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2888.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}]}