The application does not change the session token when using the login or logout functionality. An attacker can set a session token in the victim's browser (e.g. via XSS) and prompt the victim to log in (e.g. via a redirect to the login page). This results in the victim's account being taken over.
References
Configurations
No configuration.
History
21 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
References | () http://seclists.org/fulldisclosure/2024/May/34 - | |
References | () https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1 - | |
References | () https://r.sec-consult.com/hawki - |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
29 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-29 13:15
Updated : 2024-11-21 20:15
NVD link : CVE-2024-25977
Mitre link : CVE-2024-25977
CVE.ORG link : CVE-2024-25977
JSON object : View
Products Affected
No product.
CWE
CWE-384
Session Fixation