Session fixation vulnerability in WikyBlog 1.7.3 rc2 allows remote attackers to hijack web sessions by setting the jsessionid parameter to (1) index.php/Comment/Main, (2) index.php/Comment/Main/Home_Wiky, or (3) index.php/Edit/Main.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/56594 | vdb entry |
http://www.securityfocus.com/bid/38386 | vdb entry exploit |
http://www.exploit-db.com/exploits/11560 | exploit |
http://packetstormsecurity.org/1002-exploits/wikyblog-rfishellxss.txt | exploit |