Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another users current Stratos session, and act on behalf of that user.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Stratos | Cloudfoundry | * | 2.3.0 (excluding) |
Such a scenario is commonly observed when: