First published: Mon Feb 12 2018(Updated: )
Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Sitefinity | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18179 is a vulnerability in Progress Sitefinity 9.1 that allows an attacker to use a non-expiring authentication token that remains valid after a password change or a session termination.
CVE-2017-18179 affects Progress Sitefinity 9.1 by using a non-expiring authentication token that can be transmitted as a GET parameter.
CVE-2017-18179 has a severity rating of 8.8 (high).
To fix CVE-2017-18179 in Progress Sitefinity 9.1, you should upgrade to version 10.1 where this vulnerability is fixed.
You can find more information about CVE-2017-18179 at the following references: [1] [2].