Session fixation vulnerability in Symphony CMS 2.6.7, when session.use_only_cookies is disabled, allows remote attackers to hijack web sessions via the PHPSESSID parameter.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/39983/ | Exploit Third Party Advisory VDB Entry |
https://github.com/symphonycms/symphony-2/commit/b329a14adc40868965076a77210452e396243dcd | Third Party Advisory |
http://hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt | Third Party Advisory |
http://packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/91299 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/538714/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2016-06-30 10:59
Updated : 2020-08-27 11:32
NVD link : CVE-2016-4309
Mitre link : CVE-2016-4309
JSON object : View
CWE
NVD-CWE-Other
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
getsymphony
- symphony