CVE Vulnerabilities

CVE-2021-34428

Insufficient Session Expiration

Published: Jun 22, 2021 | Modified: Nov 21, 2024
CVSS 3.x
3.5
LOW
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
3.5 LOW
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
JettyEclipse*9.4.40 (including)
JettyEclipse10.0.0 (including)10.0.2 (including)
JettyEclipse11.0.0 (including)11.0.2 (including)
Red Hat AMQ 7.9.0RedHatjetty-server*
Red Hat AMQ Streams 1.8.0RedHatjetty-server*
Red Hat Fuse 7.10RedHatjetty*
Red Hat Integration Camel Quarkus 2RedHat*
Red Hat OpenShift Container Platform 4.9RedHatjenkins-0:2.289.3.1630554997-1.el8*
JettyUbuntutrusty*
JettyUbuntutrusty/esm*
JettyUbuntuxenial*
Jetty8Ubuntutrusty*
Jetty8Ubuntutrusty/esm*
Jetty8Ubuntuxenial*
Jetty9Ubuntubionic*
Jetty9Ubuntuesm-apps/bionic*
Jetty9Ubuntuesm-apps/focal*
Jetty9Ubuntuesm-apps/xenial*
Jetty9Ubuntufocal*
Jetty9Ubuntugroovy*
Jetty9Ubuntuhirsute*
Jetty9Ubuntuimpish*
Jetty9Ubuntukinetic*
Jetty9Ubuntulunar*
Jetty9Ubuntumantic*
Jetty9Ubuntutrusty*
Jetty9Ubuntuupstream*
Jetty9Ubuntuxenial*

Potential Mitigations

References