A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the "Expo AuthSession Redirect Proxy" for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc).
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: checkpoint
Published:
Updated: 2025-02-04T16:33:56.283Z
Reserved: 2023-03-10T00:00:00.000Z
Link: CVE-2023-28131

Updated: 2024-08-02T12:30:24.407Z

Status : Modified
Published: 2023-04-24T05:15:08.653
Modified: 2025-02-04T17:15:13.310
Link: CVE-2023-28131

No data.