CVE-2018-1000519
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
aio-libs aiohttp-session contiene una vulnerabilidad de fijación de sesión en la función load_session en RedisStorage (véase: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) que puede resultar en un secuestro de sesión. El ataque parece ser explotable mediante cualquier método que permita establecer cookies de sesión (?session=<> o meta tags o script tags con Set-Cookie).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-04-30 CVE Reserved
- 2018-06-26 CVE Published
- 2024-05-05 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-384: Session Fixation
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/aio-libs/aiohttp-session/issues/272 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Aio-libs Project Search vendor "Aio-libs Project" | Aiohttp Search vendor "Aio-libs Project" for product "Aiohttp" | - | - |
Affected
|