CVE-2018-1000519

aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
Configurations

Configuration 1 (hide)

cpe:2.3:a:aio-libs_project:aiohttp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 - Third Party Advisory () https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 - Third Party Advisory
References () https://github.com/aio-libs/aiohttp-session/issues/272 - Exploit, Third Party Advisory () https://github.com/aio-libs/aiohttp-session/issues/272 - Exploit, Third Party Advisory

Information

Published : 2018-06-26 16:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-1000519

Mitre link : CVE-2018-1000519

CVE.ORG link : CVE-2018-1000519


JSON object : View

Products Affected

aio-libs_project

  • aiohttp
CWE
CWE-384

Session Fixation