Miggo Logo

CVE-2022-3269: rdiffweb vulnerable to account access via session fixation

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.21288%
Published
9/25/2022
Updated
10/25/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
rdiffwebpip< 2.4.72.4.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing session regeneration in authentication workflows. The patch adds 'cherrypy.session.regenerate()' calls in both login and logout handlers:

  1. In LoginPage.index, session fixation was possible because the same session ID was retained after successful authentication
  2. In LogoutPage.default, session persistence was maintained because logout only nullified the user association without invalidating the session ID These omissions violated session management best practices by keeping static session identifiers across authentication state changes, enabling session fixation attacks. The high confidence comes from the direct correlation between the missing session regeneration calls in these functions and the CWE-384 description of session fixation vulnerabilities.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

r*i**w** prior to *.*.* **ils to inv*li**t* s*ssion *ooki*s on lo*out, l***in* to s*ssion *ix*tion *n* *llowin* *n *tt**k*r to ****ss * us*rs ***ount. **t*r lo**in* in *n* lo**in* out, t** *ppli**tion *ontinu*s to us* t** pr**ut**nti**tion *ooki*s. T

Reasoning

T** vuln*r**ility st*ms *rom missin* s*ssion r***n*r*tion in *ut**nti**tion work*lows. T** p*t** ***s '***rrypy.s*ssion.r***n*r*t*()' **lls in *ot* lo*in *n* lo*out **n*l*rs: *. In Lo*inP***.in**x, s*ssion *ix*tion w*s possi*l* ****us* t** s*m* s*ssi
CVE-2022-3269: rdiffweb Logout Session Fixation | Miggo