First published: Wed Jun 23 2010(Updated: )
It was reported that Luci's (Luci is a web based front-end component of the Conga cluster management system) user session timeout feature depended only on JavaScript script running in the user's browser. If user closed browser tab without logging out of Luci session and without closing browser, they could re-open Luci web interface and continue using the session even after the timeout period has elapsed. References: <a href="http://sourceware.org/cluster/conga/">http://sourceware.org/cluster/conga/</a> Acknowledgement: Red Hat would like to thank George Hedfors of Cybercom Sweden East AB for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Conga | ||
Luci |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-607179 is considered medium due to the potential for session hijacking.
To mitigate REDHAT-BUG-607179, ensure that session management is handled on the server side rather than relying solely on client-side JavaScript.
REDHAT-BUG-607179 affects the Red Hat Conga system and its Luci web interface.
Yes, REDHAT-BUG-607179 can allow an attacker to gain unauthorized access to a user's session if not properly mitigated.
A possible workaround for REDHAT-BUG-607179 is to instruct users to log out manually before closing their browser tabs.