symphonycms/symphony-2 is vulnerable to session fixation. The vulnerability exists as it does not regenerate the user’s PHPSESSID cookie value upon a successful authentication. If a user’s PHPSESSID cookie value can be modified by means of application logic or another vulnerability, an attacker will be able to fix the user’s session token value with a value of choice and gain access to the application as the user when the user successfully authenticates to the application.
CPE | Name | Operator | Version |
---|---|---|---|
symphonycms/symphony-2 | le | 2.6.11 | |
symphonycms/symphony-2 | le | 2.6.11 |
hyp3rlinx.altervista.org/advisories/SYMPHONY-CMS-SESSION-FIXATION.txt
packetstormsecurity.com/files/137551/Symphony-CMS-2.6.7-Session-Fixation.html
www.securityfocus.com/archive/1/538714/100/0/threaded
www.securityfocus.com/bid/91299
github.com/symphonycms/symphony-2/commit/b329a14adc40868965076a77210452e396243dcd
github.com/symphonycms/symphonycms/commit/6f99eb49e6f6098bb359bec247cf7d9571642084
www.exploit-db.com/exploits/39983
www.exploit-db.com/exploits/39983/