First published: Wed Nov 06 2024(Updated: )
A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
Affected Software | Affected Version | How to fix |
---|---|---|
NGINX | 3 | |
F5 NGINX Instance Manager | >=2.5.0<=2.17.3 | 2.17.4 |
PTC ThingWorx Industrial Connectivity | >=1.3.0<=1.9.2 | 1.9.3 |
Kubernetes Nginx Ingress Controller | >=3.0.0<=3.7.0 | 3.7.1 |
Kubernetes Nginx Ingress Controller | >=2.2.1<=2.4.2 | |
Kubernetes Nginx Ingress Controller | =1.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148232 is considered high due to the potential for session fixation attacks.
To fix F5-K000148232, upgrade to the recommended versions specified in the advisory for each affected product.
F5-K000148232 affects NGINX Plus, NGINX Instance Manager, NGINX API Connectivity Manager, and NGINX Ingress Controller.
F5-K000148232 describes a session fixation issue where a nonce is not validated at login, allowing an attacker to fix a victim's session.
No, the attacker cannot log in as the victim but can fix the victim's session to an attacker-controlled account.