ghsa-6657-9743-4mc6
Vulnerability from github
Published
2022-11-30 12:30
Modified
2022-12-06 18:52
Severity ?
VLAI Severity ?
Summary
Tribal Systems Zenario CMS vulnerable to Session Fixation
Details
Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when "Remember me" option active. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with. The attack may be initiated remotely and an exploit has been disclosed.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "tribalsystems/zenario" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "9.3.57595" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-4231" ], "database_specific": { "cwe_ids": [ "CWE-384" ], "github_reviewed": true, "github_reviewed_at": "2022-12-05T18:31:41Z", "nvd_published_at": "2022-11-30T12:15:00Z", "severity": "MODERATE" }, "details": "Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when \"Remember me\" option active. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with. The attack may be initiated remotely and an exploit has been disclosed.", "id": "GHSA-6657-9743-4mc6", "modified": "2022-12-06T18:52:07Z", "published": "2022-11-30T12:30:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4231" }, { "type": "PACKAGE", "url": "https://github.com/TribalSystems/Zenario" }, { "type": "WEB", "url": "https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation" }, { "type": "WEB", "url": "https://vuldb.com/?id.214589" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Tribal Systems Zenario CMS vulnerable to Session Fixation" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…