Session fixation vulnerability in Symphony CMS 2.6.7, when session.use_only_cookies is disabled, allows remote attackers to hijack web sessions via the PHPSESSID parameter.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/39983/ | third party advisory vdb entry exploit |
http://www.securityfocus.com/bid/91299 | third party advisory vdb entry |
http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt | third party advisory |
https://github.com/symphonycms/symphony-2/commit/b329a14adc40868965076a77210452e396243dcd | third party advisory |
http://www.securityfocus.com/archive/1/538714/100/0/threaded | mailing list third party advisory vdb entry |
http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html | third party advisory vdb entry exploit |