In Pow (Hex package) before 1.0.16, the use of Plug.Session in Pow.Plug.Session is susceptible to session fixation attacks if a persistent session store is used for Plug.Session, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1831 | In Pow (Hex package) before 1.0.16, the use of Plug.Session in Pow.Plug.Session is susceptible to session fixation attacks if a persistent session store is used for Plug.Session, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. |
Github GHSA |
GHSA-v2wf-c3j6-wpvw | Session fixation |
Fixes
Solution
No solution given by the vendor.
Workaround
Call Plug.Conn.configure_session(conn, renew: true) periodically and after privilege change. A custom authorization plug can be written where the create/3 method should return the conn only after Plug.Conn.configure_session/2 have been called on it.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T08:22:08.880Z
Reserved: 2020-01-02T00:00:00
Link: CVE-2020-5205
No data.
Status : Modified
Published: 2020-01-09T02:15:13.340
Modified: 2024-11-21T05:33:40.553
Link: CVE-2020-5205
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA