CVE Vulnerabilities

CVE-2021-34428

Insufficient Session Expiration

Published: Jun 22, 2021 | Modified: Nov 07, 2023
CVSS 3.x
3.5
LOW
Source:
NVD
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
3.5 LOW
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Jetty Eclipse * 9.4.40 (including)
Jetty Eclipse 10.0.0 (including) 10.0.2 (including)
Jetty Eclipse 11.0.0 (including) 11.0.2 (including)
Jetty Ubuntu trusty *
Jetty Ubuntu trusty/esm *
Jetty Ubuntu xenial *
Jetty8 Ubuntu trusty *
Jetty8 Ubuntu trusty/esm *
Jetty8 Ubuntu xenial *
Jetty9 Ubuntu bionic *
Jetty9 Ubuntu groovy *
Jetty9 Ubuntu hirsute *
Jetty9 Ubuntu impish *
Jetty9 Ubuntu kinetic *
Jetty9 Ubuntu lunar *
Jetty9 Ubuntu mantic *
Jetty9 Ubuntu trusty *
Jetty9 Ubuntu xenial *
Red Hat AMQ 7.9.0 RedHat jetty-server *
Red Hat AMQ Streams 1.8.0 RedHat jetty-server *
Red Hat Fuse 7.10 RedHat jetty *
Red Hat Integration Camel Quarkus RedHat jetty *
Red Hat OpenShift Container Platform 4.9 RedHat jenkins-0:2.289.3.1630554997-1.el8 *

Potential Mitigations

References