CVE-2024-10318

A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
f5CNA
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
VendorProductVersion
f5nginx_api_connectivity_manager
1.3.0 ≤
𝑥
< 1.9.3
f5nginx_ingress_controller
𝑥
≤ 1.12.5
f5nginx_ingress_controller
2.2.1 ≤
𝑥
≤ 2.4.2
f5nginx_ingress_controller
3.0.0 ≤
𝑥
< 3.7.1
f5nginx_instance_manager
2.5.0 ≤
𝑥
< 2.17.4
f5nginx_openid_connect
𝑥
< 2024-10-24
𝑥
= Vulnerable software versions