An issue was discovered in DAViCal Andrews Web Libraries (AWL) through 0.60. Long-term session cookies, uses to provide long-term session continuity, are not generated securely, enabling a brute-force attack that may be successful.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Andrew’s_web_libraries | Davical | * | 0.60 (including) |
Awl | Ubuntu | bionic | * |
Awl | Ubuntu | eoan | * |
Awl | Ubuntu | esm-apps/bionic | * |
Awl | Ubuntu | esm-apps/xenial | * |
Awl | Ubuntu | focal | * |
Awl | Ubuntu | trusty | * |
Awl | Ubuntu | upstream | * |
Awl | Ubuntu | xenial | * |
Such a scenario is commonly observed when: