Description
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0888 | A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Github GHSA |
GHSA-7fhr-2694-rg79 | Session Fixation in WildFly Elytron |
References
History
No history.
Subscriptions
Netapp
Subscribe
Oncommand Insight
Subscribe
Redhat
Subscribe
Codeready Studio
Subscribe
Descision Manager
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Cd
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Jboss Single Sign On
Subscribe
Openshift Application Runtimes
Subscribe
Process Automation
Subscribe
Wildfly Elytron
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.215Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10714
No data.
Status : Modified
Published: 2020-09-23T13:15:15.233
Modified: 2024-11-21T04:55:54.693
Link: CVE-2020-10714
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA