GMS-2022-5367: com.enonic.xp:lib-auth vulnerable to Session Fixation
Impact
All id-providers using lib-auth login
method. lib-auth should invalidate old session after login and replicate session attributes in a new one, however this is not the behavior in affected versions.
Workarounds
Don’t use lib-auth for login
.
Java API uses low-level structures and allows to invalidate previous session before auth-info is added.
References
https://github.com/enonic/xp/issues/9253
References
- github.com/advisories/GHSA-4m5p-5w5w-3jcf
- github.com/enonic/xp/commit/0189975691e9e6407a9fee87006f730e84f734ff
- github.com/enonic/xp/commit/1f44674eb9ab3fbab7103e8d08067846e88bace4
- github.com/enonic/xp/commit/2abac31cec8679074debc4f1fb69c25930e40842
- github.com/enonic/xp/issues/9253
- github.com/enonic/xp/security/advisories/GHSA-4m5p-5w5w-3jcf
Detect and mitigate GMS-2022-5367 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →