Description
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=1825714
https://security.netapp.com/advisory/ntap-20201223-0002/
Related Vulnerabilities
CVE-2022-32210 Vulnerability in maven package org.webjars.npm:undici
CVE-2022-23848 Vulnerability in maven package org.alluxio:alluxio-logserver
CVE-2023-46499 Vulnerability in npm package @evershop/evershop
CVE-2022-43402 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-cps
CVE-2023-34238 Vulnerability in npm package gatsby-plugin-sharp