A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users. It is also called a "SAML2 multi-session vulnerability."
References
Link | Resource |
---|---|
https://pagure.io/ipsilon/c/511fa8b7001c2f9a42301aa1d4b85aaf170a461c | Patch Vendor Advisory |
https://ipsilon-project.org/advisory/CVE-2016-8638.txt | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8638 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/94439 | Third Party Advisory VDB Entry |
https://ipsilon-project.org/release/2.1.0.html | |
http://rhn.redhat.com/errata/RHSA-2016-2809.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-07-12 06:29
Updated : 2023-02-12 15:26
NVD link : CVE-2016-8638
Mitre link : CVE-2016-8638
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
ipsilon_project
- ipsilon