CVE-2020-10714

A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1825714 Issue Tracking Mitigation Vendor Advisory
https://security.netapp.com/advisory/ntap-20201223-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:wildfly_elytron:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-23 13:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-10714

Mitre link : CVE-2020-10714

CVE.ORG link : CVE-2020-10714


JSON object : View

Products Affected

redhat

  • process_automation
  • descision_manager
  • wildfly_elytron
  • jboss_fuse
  • codeready_studio

netapp

  • oncommand_insight
CWE
CWE-384

Session Fixation