First published: Thu May 27 2021(Updated: )
Cubecart 6.4.2 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cubecart Cubecart | =6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33394 is medium with a CVSS score of 5.4.
Cubecart 6.4.2 allows session fixation by not generating a new session cookie after the user is logged in.
The impact of session fixation in Cubecart 6.4.2 is that a malicious user can create a new session cookie value and inject it to a victim, giving the attacker unauthorized access.
Yes, there is a fix available for CVE-2021-33394. Users should update to a version of Cubecart that includes the fix.
More information about CVE-2021-33394 can be found at the following references: [GitHub Commit](https://github.com/cubecart/v6/commit/aac7b3a13a43e302d91f94a120417b2fda737d0f) and [Session Fixation in Cubecart 6.4.2](https://github.com/xoffense/POC/blob/main/Session%20Fixation%20in%20Cubecart%206.4.2.md).