First published: Tue Apr 29 2014(Updated: )
Session fixation vulnerability in the Ubercart module 6.x-2.x before 6.x-2.13 and 7.x-3.x before 7.x-3.6 for Drupal, when the "Log in new customers after checkout" option is enabled, allows remote attackers to hijack web sessions by leveraging knowledge of the original session ID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubercart Ubercart | =6.x-2.0 | |
Ubercart Ubercart | =6.x-2.0-beta1 | |
Ubercart Ubercart | =6.x-2.0-beta2 | |
Ubercart Ubercart | =6.x-2.0-beta3 | |
Ubercart Ubercart | =6.x-2.0-beta4 | |
Ubercart Ubercart | =6.x-2.0-beta5 | |
Ubercart Ubercart | =6.x-2.0-beta6 | |
Ubercart Ubercart | =6.x-2.0-dev | |
Ubercart Ubercart | =6.x-2.0-rc1 | |
Ubercart Ubercart | =6.x-2.0-rc2 | |
Ubercart Ubercart | =6.x-2.0-rc3 | |
Ubercart Ubercart | =6.x-2.0-rc4 | |
Ubercart Ubercart | =6.x-2.0-rc5 | |
Ubercart Ubercart | =6.x-2.0-rc6 | |
Ubercart Ubercart | =6.x-2.0-rc7 | |
Ubercart Ubercart | =6.x-2.1 | |
Ubercart Ubercart | =6.x-2.2 | |
Ubercart Ubercart | =6.x-2.3 | |
Ubercart Ubercart | =6.x-2.4 | |
Ubercart Ubercart | =6.x-2.6 | |
Ubercart Ubercart | =6.x-2.7 | |
Ubercart Ubercart | =6.x-2.8 | |
Ubercart Ubercart | =6.x-2.9 | |
Ubercart Ubercart | =6.x-2.10 | |
Ubercart Ubercart | =6.x-2.11 | |
Ubercart Ubercart | =6.x-2.12 | |
Ubercart Ubercart | =7.x-3.0 | |
Ubercart Ubercart | =7.x-3.0-alpha1 | |
Ubercart Ubercart | =7.x-3.0-alpha2 | |
Ubercart Ubercart | =7.x-3.0-alpha3 | |
Ubercart Ubercart | =7.x-3.0-beta1 | |
Ubercart Ubercart | =7.x-3.0-beta2 | |
Ubercart Ubercart | =7.x-3.0-beta3 | |
Ubercart Ubercart | =7.x-3.0-beta4 | |
Ubercart Ubercart | =7.x-3.0-dev | |
Ubercart Ubercart | =7.x-3.0-rc1 | |
Ubercart Ubercart | =7.x-3.0-rc2 | |
Ubercart Ubercart | =7.x-3.0-rc3 | |
Ubercart Ubercart | =7.x-3.0-rc4 | |
Ubercart Ubercart | =7.x-3.1 | |
Ubercart Ubercart | =7.x-3.2 | |
Ubercart Ubercart | =7.x-3.3 | |
Ubercart Ubercart | =7.x-3.4 | |
Ubercart Ubercart | =7.x-3.5 | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.