CVE-2024-7341
Oct. 4, 2024, 12:48 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
redhat |
|
|
Description
A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.
Weaknesses
CWE-384
Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
CWE ID: 384Date
Published: Sept. 9, 2024, 7:15 p.m.
Last Modified: Oct. 4, 2024, 12:48 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
secalert@redhat.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | redhat | keycloak | / | / | / | / | / | / | / | / |
a | redhat | single_sign-on | / | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 7.0 | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 8.0 | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 9.0 | / | / | / | / | / | / | / |
a | redhat | build_of_keycloak | / | / | / | / | / | / | / | / |
a | redhat | build_of_keycloak | / | / | / | / | / | / | / | / |
a | redhat | single_sign-on | - | / | / | / | text-only | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
HIGHCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H