Session fixation on password protected public links in the ownCloud Server before 10.8.0 allows an attacker to bypass the password protection when they can force a target client to use a controlled cookie.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://doc.owncloud.com/server/admin_manual/release_notes.html | release notes vendor advisory |
https://owncloud.com/security-advisories/cve-2021-35948/ | vendor advisory |