An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's account through the active session. The Session Fixation attack fixes a session on the victim's browser, so the attack starts before the user logs in.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/robiso/wondercms/issues/64 | Exploit Issue Tracking Third Party Advisory | 
| https://www.wondercms.com/whatsnew | Vendor Advisory | 
| https://github.com/robiso/wondercms/issues/64 | Exploit Issue Tracking Third Party Advisory | 
| https://www.wondercms.com/whatsnew | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/robiso/wondercms/issues/64 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://www.wondercms.com/whatsnew - Vendor Advisory | 
Information
                Published : 2018-07-18 19:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-14387
Mitre link : CVE-2018-14387
CVE.ORG link : CVE-2018-14387
JSON object : View
Products Affected
                wondercms
- wondercms
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
