A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users. It is also called a "SAML2 multi-session vulnerability."
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2809.html | |
http://www.securityfocus.com/bid/94439 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8638 | Issue Tracking Third Party Advisory |
https://ipsilon-project.org/advisory/CVE-2016-8638.txt | Vendor Advisory |
https://ipsilon-project.org/release/2.1.0.html | |
https://pagure.io/ipsilon/c/511fa8b7001c2f9a42301aa1d4b85aaf170a461c | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-07-12 13:29
Updated : 2023-11-07 02:36
NVD link : CVE-2016-8638
Mitre link : CVE-2016-8638
CVE.ORG link : CVE-2016-8638
JSON object : View
Products Affected
ipsilon_project
- ipsilon
CWE
CWE-384
Session Fixation