Miggo Logo

CVE-2017-2589: Insecure cookie sharing in Hawtio

9

CVSS Score
3.0

Basic Information

EPSS Score
0.39656%
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.hawt:projectmaven< 1.5.01.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using a singleton HttpClient with a persistent cookie store. The advisory explicitly states this pattern causes cookie sharing between clients. The function responsible for HttpClient initialization would be where the cookie store is configured. While exact code isn't shown, Hawtio's architecture patterns and Java servlet conventions make ProxyServlet.createHttpClient the most likely candidate, as it would control proxy client configuration. The fix in 1.5.0 likely replaced this with per-request/client cookie stores.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It w*s *is*ov*r** t**t t** **wtio s*rvl*t *.* us*s * sin*l* *ttp*li*nt inst*n** to proxy r*qu*sts wit* * p*rsist*nt *ooki* stor* (*ooki*s *r* stor** lo**lly *n* *r* not p*ss** **tw**n t** *li*nt *n* t** *n* URL) w*i** m**ns *ll *li*nts usin* t**t pro

Reasoning

T** vuln*r**ility st*ms *rom usin* * sin*l*ton `*ttp*li*nt` wit* * p*rsist*nt *ooki* stor*. T** **visory *xpli*itly st*t*s t*is p*tt*rn **us*s *ooki* s**rin* **tw**n *li*nts. T** *un*tion r*sponsi*l* *or `*ttp*li*nt` initi*liz*tion woul* ** w**r* t**