An issue was discovered in Cloud Foundry Foundation Cloud Foundry release v252 and earlier versions, UAA stand-alone release v2.0.0 - v2.7.4.12 & v3.0.0 - v3.11.0, and UAA bosh release v26 & earlier versions. UAA is vulnerable to session fixation when configured to authenticate against external SAML or OpenID Connect based identity providers.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cloud_foundry_cf-release | Pivotal_software | * | 252 (including) |
Cloud_foundry_uaa | Pivotal_software | 2.0.0 (including) | 2.7.4.12 (including) |
Cloud_foundry_uaa | Pivotal_software | 3.0.0 (including) | 3.11.0 (including) |
Cloud_foundry_uaa-release | Pivotal_software | * | 26 (including) |
Such a scenario is commonly observed when: