CVE Vulnerabilities

CVE-2024-10318

Session Fixation

Published: Nov 06, 2024 | Modified: Nov 08, 2024
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Ubuntu

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victims session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victims session.

Weakness

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

Affected Software

Name Vendor Start Version End Version
Nginx_api_connectivity_manager F5 1.3.0 (including) 1.9.3 (excluding)
Nginx_ingress_controller F5 * 1.12.5 (including)
Nginx_ingress_controller F5 2.2.1 (including) 2.4.2 (including)
Nginx_ingress_controller F5 3.0.0 (including) 3.7.1 (excluding)
Nginx_instance_manager F5 2.5.0 (including) 2.17.4 (excluding)

Extended Description

Such a scenario is commonly observed when:

Potential Mitigations

References