Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-10318

Опубликовано: 06 нояб. 2024
Источник: nvd
CVSS3: 5.4
EPSS Низкий

Описание

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:f5:nginx_api_connectivity_manager:*:*:*:*:*:*:*:*
Версия от 1.3.0 (включая) до 1.9.3 (исключая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия до 1.12.5 (включая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия от 2.2.1 (включая) до 2.4.2 (включая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.7.1 (исключая)
cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*
Версия от 2.5.0 (включая) до 2.17.4 (исключая)
Конфигурация 2
cpe:2.3:a:f5:nginx_openid_connect:*:*:*:*:*:nginx_plus:*:*
Версия до 2024-10-24 (исключая)

EPSS

Процентиль: 68%
0.00578
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-384
CWE-384

Связанные уязвимости

CVSS3: 5.4
redhat
больше 1 года назад

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

CVSS3: 5.4
github
больше 1 года назад

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.

CVSS3: 5.4
fstec
больше 1 года назад

Уязвимость модуля аутентификацию через протокол OpenID Connect веб-сервера NGINX, связанная с некорректным управлением сеансом, позволяющая нарушителю получить полный доступ к приложению

EPSS

Процентиль: 68%
0.00578
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-384
CWE-384