First published: Tue Jun 26 2018(Updated: )
aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/aiohttp-session | <2.4.0 | 2.4.0 |
aiohttp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000519 is classified as a medium severity vulnerability due to the potential for session hijacking.
To fix CVE-2018-1000519, upgrade aiohttp-session to version 2.4.0 or later.
The impact of CVE-2018-1000519 is that it allows an attacker to hijack sessions using the load_session function for RedisStorage.
Affecting users of aiohttp-session versions prior to 2.4.0 who utilize Redis for session storage.
The vulnerable component in CVE-2018-1000519 is the load_session function in the RedisStorage of aiohttp-session.