aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value.
References
Link | Resource |
---|---|
https://github.com/aio-libs/aiohttp-session/issues/325 | Exploit Third Party Advisory |
https://github.com/aio-libs/aiohttp-session/pull/331 | Patch Third Party Advisory |
https://github.com/aio-libs/aiohttp-session/issues/325 | Exploit Third Party Advisory |
https://github.com/aio-libs/aiohttp-session/pull/331 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/aio-libs/aiohttp-session/issues/325 - Exploit, Third Party Advisory | |
References | () https://github.com/aio-libs/aiohttp-session/pull/331 - Patch, Third Party Advisory |
Information
Published : 2018-12-20 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000814
Mitre link : CVE-2018-1000814
CVE.ORG link : CVE-2018-1000814
JSON object : View
Products Affected
aiohttp-session_project
- aiohttp-session
CWE
CWE-613
Insufficient Session Expiration