Lucene search

K
githubGitHub Advisory DatabaseGHSA-6CQ5-8CJ7-G558
HistoryDec 22, 2022 - 8:01 p.m.

CodeIgniter4 Potential Session Handlers Vulnerability

2022-12-2220:01:18
CWE-287
GitHub Advisory Database
github.com
20
codeigniter4
session cookies
session handler
databasehandler
memcachedhandler
redishandler
upgrade
workarounds
user pages
admin pages
security advisory
github issue
email

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.9%

Impact

When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to DatabaseHandler, MemcachedHandler, or RedisHandler, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages).

Patches

Upgrade to version 4.2.11 or later.

Workarounds

  • Use only one session cookie.

References

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
codeigniter4frameworkRange<4.2.11
CPENameOperatorVersion
codeigniter4/frameworklt4.2.11

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.9%