CVE-2022-23063

8.8 HIGH

📋 TL;DR

This vulnerability allows users who were already logged into Shopizer to maintain access even after their password has been changed, either by themselves or an administrator. This affects Shopizer e-commerce platform users and administrators who rely on password changes for security. The insufficient session expiration means compromised accounts may remain accessible to attackers.

💻 Affected Systems

Products:
  • Shopizer
Versions: 2.3.0 to 3.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker who gains temporary access to a user account maintains persistent access even after the legitimate user changes their password, potentially leading to data theft, unauthorized purchases, or administrative compromise.

🟠

Likely Case

Users who change passwords for security reasons remain vulnerable to previous session hijacking, allowing unauthorized access to personal data and order history.

🟢

If Mitigated

With proper session invalidation controls, password changes immediately terminate all existing sessions, limiting the window for unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an existing authenticated session, making it straightforward for attackers with initial access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.2 and later

Vendor Advisory: https://github.com/shopizer-ecommerce/shopizer/security/advisories

Restart Required: Yes

Instructions:

1. Backup your Shopizer installation and database. 2. Update to Shopizer version 3.0.2 or later. 3. Restart the application server. 4. Verify sessions are properly invalidated after password changes.

🔧 Temporary Workarounds

Manual Session Invalidation

all

Implement custom session management to invalidate all sessions when passwords are changed.

Modify authentication logic to clear session tokens on password change events

🧯 If You Can't Patch

  • Implement forced logout for all users after password changes through administrative controls
  • Monitor for suspicious activity from old session tokens and manually terminate sessions

🔍 How to Verify

Check if Vulnerable:

Test by logging into Shopizer, changing the password in another browser/tab, then attempting to use the original session - if it remains active, the system is vulnerable.

Check Version:

Check the Shopizer version in the application's admin panel or configuration files.

Verify Fix Applied:

After patching, repeat the vulnerable test - original sessions should be immediately terminated upon password change.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same user after password change events
  • Session tokens remaining active beyond password reset timestamps

Network Indicators:

  • Unusual session duration patterns
  • Authentication requests from old session tokens after password changes

SIEM Query:

source="shopizer" AND (event="password_change" OR event="password_reset") | stats count by user, session_id | where count > 1

🔗 References

📤 Share & Export