Description
Cubecart 6.4.2 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session.
References
https://github.com/cubecart/v6/commit/aac7b3a13a43e302d91f94a120417b2fda737d0f
https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md
https://github.com/cubecart/v6/commit/aac7b3a13a43e302d91f94a120417b2fda737d0f
https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-05-27T17:15:08.327Z
4 years agoLast modified
2024-11-21T05:08:47.850Z
1 year ago