In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore.
The J2EE application is configured to use an insufficient session ID length.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1041194 | third party advisory vdb entry |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | mailing list |
https://www.oracle.com/security-alerts/cpuoct2020.html | |
https://security.netapp.com/advisory/ntap-20181014-0001/ | third party advisory |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018 | vendor advisory issue tracking |