Description
Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-9314 | Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:55:34.950Z
Reserved: 2018-02-12T00:00:00.000Z
Link: CVE-2017-18179
No data.
Status : Modified
Published: 2018-02-12T14:29:00.427
Modified: 2024-11-21T03:19:29.917
Link: CVE-2017-18179
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD