An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Long-term session cookies, uses to provide long-term session continuity, are not generated securely, enabling a brute-force attack that may be successful.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://gitlab.com/davical-project/awl/-/issues/18 | third party advisory issue tracking exploit |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956650 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/04/msg00011.html | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4660 | third party advisory vendor advisory |