In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore.
References
Link | Resource |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=536018 | Issue Tracking Vendor Advisory |
http://www.securitytracker.com/id/1041194 | Third Party Advisory VDB Entry |
https://security.netapp.com/advisory/ntap-20181014-0001/ | Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E | |
https://www.oracle.com/security-alerts/cpuoct2020.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-06-22 12:29
Updated : 2020-10-20 15:15
NVD link : CVE-2018-12538
Mitre link : CVE-2018-12538
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
netapp
- santricity_cloud_connector
- oncommand_system_manager
- element_software
- snapmanager
- snapcenter
- hyper_converged_infrastructure
- snap_creator_framework
- oncommand_unified_manager
- e-series_santricity_management_plug-ins
- e-series_santricity_web_services_proxy
- e-series_santricity_os_controller
eclipse
- jetty