CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.
References
Link | Resource |
---|---|
https://github.com/codeigniter4/CodeIgniter4/commit/f9fb6574fbeb5a4aa63f7ea87296523e10db9328 | Patch Third Party Advisory |
https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-6cq5-8cj7-g558 | Third Party Advisory |
Configurations
Information
Published : 2022-12-22 11:15
Updated : 2022-12-29 08:23
NVD link : CVE-2022-46170
Mitre link : CVE-2022-46170
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
codeigniter
- codeigniter