First published: Mon May 18 2020(Updated: )
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rConfig rConfig | =3.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12258 is a vulnerability in rConfig 3.9.4 that allows session fixation due to mishandled session expiry and randomization.
CVE-2020-12258 has a severity rating of 9.1 (critical).
rConfig version 3.9.4 is affected by CVE-2020-12258.
An attacker can exploit CVE-2020-12258 by reusing a session via PHPSESSID and leveraging vulnerabilities like CVE-2020-12256 or CVE-2020-12259.
Yes, you can find more information about CVE-2020-12258 at the following reference: [GitHub Gist](https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8)