Lucene search

K
redhatcveRedhat.comRH:CVE-2021-20324
HistoryOct 28, 2021 - 9:10 p.m.

CVE-2021-20324

2021-10-2821:10:12
redhat.com
access.redhat.com
42
wildfly elytron
session fixation
undertow
data confidentiality
data integrity
session timeout
session tracking

A flaw was found in WildFly Elytron. A variation to the use of a session fixation exploit when using Undertow was found despite Undertow switching the session ID after authentication. The highest threat from this vulnerability is to data confidentiality and integrity.

Mitigation

This attack is dependent on the attacker being able to create a session and the victim accessing the session before the session expires, we do have a 15 minute session timeout by default but the attacker could also keep this alive by say sending in a request every five minutes.

The server by default supports session tracking by URL and Cookie, if the web.xml is updated to support COOKIE only the exploit is not possible by sharing the link.

  <session-config>  
    <tracking-mode>URL</tracking-mode>  
  </session-config>  

TO

  <session-config>  
    <tracking-mode>COOKIE</tracking-mode>  
  </session-config>  
Related for RH:CVE-2021-20324