A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1825714 | issue tracking vendor advisory mitigation |
https://security.netapp.com/advisory/ntap-20201223-0002/ | third party advisory |