Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4m5p-5w5w-3jcf: com.enonic.xp:lib-auth vulnerable to Session Fixation

Impact

All id-providers using lib-auth login method. lib-auth should invalidate old session after login and replicate session attributes in a new one, however this is not the behavior in affected versions.

Workarounds

Don’t use lib-auth for login. Java API uses low-level structures and allows to invalidate previous session before auth-info is added.

References

https://github.com/enonic/xp/issues/9253

ghsa
#git#java#auth

com.enonic.xp:lib-auth vulnerable to Session Fixation

Critical severity GitHub Reviewed Published Oct 12, 2022 in enonic/xp • Updated Oct 12, 2022

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access