Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2hvh-cw5c-8q8q

Опубликовано: 29 окт. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

CKAN vulnerable to fixed session IDs

Impact

Session ids could be fixed by an attacker if the site is configured with server-side session storage (CKAN uses cookie-based session storage by default). The attacker would need to either set a cookie on the victim's browser or steal the victim's currently valid session. Session identifiers are now regenerated after each login.

Patches

This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4

References

https://en.wikipedia.org/wiki/Session_fixation

Пакеты

Наименование

ckan

pip
Затронутые версииВерсия исправления

>= 2.10.0, < 2.10.9

2.10.9

Наименование

ckan

pip
Затронутые версииВерсия исправления

>= 2.11.0, < 2.11.4

2.11.4

EPSS

Процентиль: 13%
0.00043
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 6.1
nvd
3 месяца назад

CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, session ids could be fixed by an attacker if the site is configured with server-side session storage (CKAN uses cookie-based session storage by default). The attacker would need to either set a cookie on the victim's browser or steal the victim's currently valid session. Session identifiers are now regenerated after each login. This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4

EPSS

Процентиль: 13%
0.00043
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-384