CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
55.8%
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | wildfly_elytron | * | cpe:2.3:a:redhat:wildfly_elytron:*:*:*:*:*:*:*:* |
redhat | codeready_studio | 12.0 | cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:* |
redhat | descision_manager | 7.0 | cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:* |
redhat | jboss_fuse | 7.0.0 | cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:* |
redhat | process_automation | 7.0 | cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:* |
netapp | oncommand_insight | - | cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
55.8%