IBM Jazz Foundation could allow an authenticated user to take over a previously logged in user due to session expiration not being enforced.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rational_collaborative_lifecycle_management | Ibm | 4.0.0 (including) | 4.0.0 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.1 (including) | 4.0.1 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.2 (including) | 4.0.2 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.3 (including) | 4.0.3 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.4 (including) | 4.0.4 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.5 (including) | 4.0.5 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.6 (including) | 4.0.6 (including) |
Rational_collaborative_lifecycle_management | Ibm | 4.0.7 (including) | 4.0.7 (including) |
Rational_collaborative_lifecycle_management | Ibm | 5.0.0 (including) | 5.0.0 (including) |
Rational_collaborative_lifecycle_management | Ibm | 5.0.1 (including) | 5.0.1 (including) |
Rational_collaborative_lifecycle_management | Ibm | 5.0.2 (including) | 5.0.2 (including) |
Rational_collaborative_lifecycle_management | Ibm | 6.0.0 (including) | 6.0.0 (including) |
Rational_collaborative_lifecycle_management | Ibm | 6.0.1 (including) | 6.0.1 (including) |
Rational_collaborative_lifecycle_management | Ibm | 6.0.2 (including) | 6.0.2 (including) |
Such a scenario is commonly observed when: