First published: Mon Aug 07 2017(Updated: )
Zend/Session/SessionManager in Zend Framework 2.2.x before 2.2.9, 2.3.x before 2.3.4 allows remote attackers to create valid sessions without using session validators.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zend Framework | =2.2.0 | |
Zend Framework | =2.2.1 | |
Zend Framework | =2.2.2 | |
Zend Framework | =2.2.3 | |
Zend Framework | =2.2.4 | |
Zend Framework | =2.2.5 | |
Zend Framework | =2.2.6 | |
Zend Framework | =2.2.7 | |
Zend Framework | =2.2.8 | |
Zend Framework | =2.3.0 | |
Zend Framework | =2.3.1 | |
Zend Framework | =2.3.2 | |
Zend Framework | =2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1555 is considered a high severity vulnerability due to its potential to allow unauthorized session creation.
To fix CVE-2015-1555, upgrade Zend Framework to version 2.2.9 or 2.3.4 or later.
CVE-2015-1555 allows attackers to create valid sessions, potentially leading to session hijacking and unauthorized access.
CVE-2015-1555 affects Zend Framework versions 2.2.0 to 2.2.8 and 2.3.0 to 2.3.3.
Yes, CVE-2015-1555 can be exploited by remote attackers without needing local access.