Tribal Systems Zenario CMS vulnerable to Session Fixation
Moderate severity
GitHub Reviewed
Published
Nov 30, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Description
Published by the National Vulnerability Database
Nov 30, 2022
Published to the GitHub Advisory Database
Nov 30, 2022
Reviewed
Dec 5, 2022
Last updated
Jan 31, 2023
Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when "Remember me" option active. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with. The attack may be initiated remotely and an exploit has been disclosed.
References