Session Fixation vulnerability in Apache Kylin. This issue affects Apache Kylin: from 2.0.0 through 4.x. Users are recommended to upgrade to version 5.0.0 or above, which fixes the issue.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://lists.apache.org/thread/7161154h0k6zygr9917qq0g95p39szml | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2024/11/03/1 | mailing list third party advisory |