CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.
References
Link | Resource |
---|---|
https://github.com/codeigniter4/CodeIgniter4/commit/f9fb6574fbeb5a4aa63f7ea87296523e10db9328 | Patch Third Party Advisory |
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-6cq5-8cj7-g558 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
Summary | CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie. |
Information
Published : 2022-12-22 19:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-46170
Mitre link : CVE-2022-46170
CVE.ORG link : CVE-2022-46170
JSON object : View
Products Affected
codeigniter
- codeigniter
CWE
CWE-287
Improper Authentication