CVE-2024-10318
06.11.2024, 17:15
A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.Enginsight
Vendor | Product | Version |
---|---|---|
f5 | nginx_api_connectivity_manager | 1.3.0 ≤ 𝑥 < 1.9.3 |
f5 | nginx_ingress_controller | 𝑥 ≤ 1.12.5 |
f5 | nginx_ingress_controller | 2.2.1 ≤ 𝑥 ≤ 2.4.2 |
f5 | nginx_ingress_controller | 3.0.0 ≤ 𝑥 < 3.7.1 |
f5 | nginx_instance_manager | 2.5.0 ≤ 𝑥 < 2.17.4 |
f5 | nginx_openid_connect | 𝑥 < 2024-10-24 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration