Headline
GHSA-4m5p-5w5w-3jcf: com.enonic.xp:lib-auth vulnerable to Session Fixation
Impact
All id-providers using lib-auth login
method. lib-auth should invalidate old session after login and replicate session attributes in a new one, however this is not the behavior in affected versions.
Workarounds
Don’t use lib-auth for login
.
Java API uses low-level structures and allows to invalidate previous session before auth-info is added.
References
https://github.com/enonic/xp/issues/9253
com.enonic.xp:lib-auth vulnerable to Session Fixation
Critical severity GitHub Reviewed Published Oct 12, 2022 in enonic/xp • Updated Oct 12, 2022