The application does not change the session token when using the login or logout functionality. An attacker can set a session token in the victim’s browser (e.g. via XSS) and prompt the victim to log in (e.g. via a redirect to the login page). This results in the victim’s account being taken over.
[
{
"defaultStatus": "affected",
"product": "HAWKI",
"repo": "https://github.com/HAWK-Digital-Environments/HAWKI",
"vendor": "Interaction Design Team at the University of Applied Sciences and Arts in Hildesheim/Germany",
"versions": [
{
"status": "affected",
"version": "versions before commit 146967f",
"versionType": "custom"
}
]
}
]