First published: Sat Mar 24 2007(Updated: )
Cross-site request forgery (CSRF) vulnerability in OpenID allows remote attackers to restore the login session of a user on an OpenID enabled site via unspecified vectors related to an arbitrary remote web site and cached tokens, after the user has signed into an OpenID server, logged into the OpenID enabled site, and then logged out of the OpenID enabled site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openid Openid |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-1651 is considered to be moderate due to its potential impact on user session integrity.
To fix CVE-2007-1651, implement anti-CSRF tokens and ensure proper session management in your OpenID implementation.
The impact of CVE-2007-1651 is that it allows attackers to hijack user sessions and perform unauthorized actions on OpenID-enabled sites.
Users of OpenID enabled sites are affected by CVE-2007-1651 due to vulnerabilities in session restoration mechanisms.
While older, CVE-2007-1651 remains a concern for legacy systems using OpenID that have not implemented necessary security measures.