Lucene search

K
redhatcveRedhat.comRH:CVE-2020-10714
HistoryApr 28, 2020 - 4:34 a.m.

CVE-2020-10714

2020-04-2804:34:41
redhat.com
access.redhat.com
28

EPSS

0.002

Percentile

55.8%

A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Mitigation

This attack is dependent on the attacker being able to create a session and the victim accessing the session before the session expires, we do have a 15 minute session timeout by default but the attacker could also keep this alive by say sending in a request every five minutes.

The server by default supports session tracking by URL and Cookie, if the web.xml is updated to support COOKIE only the exploit is not possible by sharing the link.

  <session-config>  
    <tracking-mode>URL</tracking-mode>  
  </session-config>  

TO

  <session-config>  
    <tracking-mode>COOKIE</tracking-mode>  
  </session-config>  

EPSS

0.002

Percentile

55.8%