First published: Thu Dec 22 2022(Updated: )
CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/codeigniter4/framework | <4.2.11 | |
Codeigniter Codeigniter | >=4.0.0<4.2.11 | |
>=4.0.0<4.2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46170 is a potential session handlers vulnerability in CodeIgniter, a PHP full-stack web framework, that can be exploited when an application uses multiple session cookies and a session handler set to 'DatabaseHandler', 'MemcachedHandler', or 'RedisHandler'.
The severity of CVE-2022-46170 is critical with a base score of 9.8.
CVE-2022-46170 affects CodeIgniter versions up to (excluding) 4.2.11 and Codeigniter Codeigniter versions between 4.0.0 and 4.2.11.
An attacker can exploit CVE-2022-46170 by obtaining one of the session cookies and using it to gain unauthorized access.
Yes, the fix for CVE-2022-46170 is available in the latest version of CodeIgniter. It is recommended to upgrade to the latest version to mitigate the vulnerability.