Gibbon v23 does not generate a new session ID cookie after a user authenticates, making the application vulnerable to session fixation.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
http://gibbon.com | product |
http://gibbonedu.com | product |
https://github.com/GibbonEdu/core/security/advisories/GHSA-4mq5-8jvh-qq3p | patch mitigation third party advisory |