Session fixation vulnerability in Symphony CMS 2.6.7, when session.use_only_cookies is disabled, allows remote attackers to hijack web sessions via the PHPSESSID parameter.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt | Third Party Advisory |
http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/538714/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/91299 | Third Party Advisory VDB Entry |
https://github.com/symphonycms/symphony-2/commit/b329a14adc40868965076a77210452e396243dcd | Third Party Advisory |
https://www.exploit-db.com/exploits/39983/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2016-06-30 17:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-4309
Mitre link : CVE-2016-4309
CVE.ORG link : CVE-2016-4309
JSON object : View
Products Affected
getsymphony
- symphony
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
NVD-CWE-Other