First published: Thu May 07 2020(Updated: )
On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Nginx Controller | >=3.0.0<=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-5894.
CVE-2020-5894 has a severity level of 8.1 (high).
Versions 3.0.0-3.3.0 of the NGINX Controller webserver are affected by CVE-2020-5894.
CVE-2020-5894 allows an attacker to potentially retain unauthorized access to a user's account even after logging out from the NGINX Controller webserver.
Yes, a fix for CVE-2020-5894 is available. Please refer to the vendor's advisory for detailed instructions on how to apply the fix.