Cal.com is open-source scheduling software. A vulnerability allows active sessions associated with an account to remain active even after enabling 2FA. When activating 2FA on a Cal.com account that is logged in on two or more devices, the account stays logged in on the other device(s) stays logged in without having to verify the account owner's identity. As of time of publication, no known patches or workarounds exist.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-07-25T20:42:28.825Z
Updated: 2024-10-16T19:45:12.080Z
Reserved: 2023-07-10T17:51:29.612Z
Link: CVE-2023-37919
Vulnrichment
Updated: 2024-08-02T17:23:27.790Z
NVD
Status : Modified
Published: 2023-07-25T21:15:10.733
Modified: 2024-11-21T08:12:28.270
Link: CVE-2023-37919
Redhat
No data.