Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8mqv-23wv-wqfg

Опубликовано: 06 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 5.4

Описание

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

EPSS

Процентиль: 68%
0.00578
Низкий

5.1 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 5.4
redhat
больше 1 года назад

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

CVSS3: 5.4
nvd
больше 1 года назад

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

CVSS3: 5.4
fstec
больше 1 года назад

Уязвимость модуля аутентификацию через протокол OpenID Connect веб-сервера NGINX, связанная с некорректным управлением сеансом, позволяющая нарушителю получить полный доступ к приложению

EPSS

Процентиль: 68%
0.00578
Низкий

5.1 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-384