IBM Jazz Foundation could allow an authenticated user to take over a previously logged in user due to session expiration not being enforced.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rational_collaborative_lifecycle_management | Ibm | 4.0.0 | 4.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.1 | 4.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.2 | 4.0.2 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.3 | 4.0.3 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.4 | 4.0.4 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.5 | 4.0.5 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.6 | 4.0.6 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.7 | 4.0.7 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.0 | 5.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.1 | 5.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.2 | 5.0.2 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.0 | 6.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.1 | 6.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.2 | 6.0.2 |
Such a scenario is commonly observed when: