Headline
CVE-2023-37919: Not expiring old sessions after enabling 2FA
Cal.com is open-source scheduling software. A vulnerability allows active sessions associated with an account to remain active even after enabling 2FA. When activating 2FA on a Cal.com account that is logged in on two or more devices, the account stays logged in on the other device(s) stays logged in without having to verify the account owner’s identity. As of time of publication, no known patches or workarounds exist.
Detail:
This vulnerability allows active sessions associated with an account to remain active even after enabling 2FA.
Reproduce:
- Access the same account on https://app.cal.com/ using two different devices.
- On device 'A’, navigate to https://app.cal.com/settings/security/two-factor-auth and enable the 2FA system.
What should happen:
Once the 2FA system is activated, all existing active sessions should be immediately invalidated for security purposes. This then should expect the user to log in to their cal.com account again using 2FA
Current Behavior:
When activitating 2FA on your Cal.com account on Device A, Device B stays logged in without having to verify your identity.
Recommended Solution:
Upon enabling 2FA on one device, all other active sessions associated with the same account should be immediately terminated.