Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
References
Link | Resource |
---|---|
http://gibbon.com | Product |
http://gibbonedu.com | Product |
https://github.com/GibbonEdu/core/security/advisories/GHSA-4mq5-8jvh-qq3p | Mitigation Patch Third Party Advisory |
http://gibbon.com | Product |
http://gibbonedu.com | Product |
https://github.com/GibbonEdu/core/security/advisories/GHSA-4mq5-8jvh-qq3p | Mitigation Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://gibbon.com - Product | |
References | () http://gibbonedu.com - Product | |
References | () https://github.com/GibbonEdu/core/security/advisories/GHSA-4mq5-8jvh-qq3p - Mitigation, Patch, Third Party Advisory |
Information
Published : 2022-05-25 16:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27305
Mitre link : CVE-2022-27305
CVE.ORG link : CVE-2022-27305
JSON object : View
Products Affected
gibbonedu
- gibbon
CWE
CWE-384
Session Fixation