A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
2024-11-06T17:15:13.680
2024-11-08T19:51:49.380
Analyzed
CVSSv3.1: 5.4 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | f5 | nginx_api_connectivity_manager | < 1.9.3 | Yes |
Application | f5 | nginx_ingress_controller | ≤ 1.12.5 | Yes |
Application | f5 | nginx_ingress_controller | ≤ 2.4.2 | Yes |
Application | f5 | nginx_ingress_controller | < 3.7.1 | Yes |
Application | f5 | nginx_instance_manager | < 2.17.4 | Yes |
Application | f5 | nginx_openid_connect | < 2024-10-24 | Yes |