CVE-2024-38513:
Session Middleware Token Injection Vulnerability
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.56044%
CWE
Published
7/1/2024
Updated
7/5/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/gofiber/fiber | go | <= 2.52.4 | 2.52.5 |
github.com/gofiber/fiber/v2 | go | <= 2.52.4 | 2.52.5 |
github.com/gofiber/fiber/v2/middleware/session | go | <= 2.52.4 | 2.52.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability root cause was improper session ID handling in two key areas: 1) The Store.Get
function accepted client-provided session IDs without validation, enabling session fixation. 2) Session decoding mechanisms lacked proper synchronization and validation, allowing injection when combined with controlled IDs. The patch added mutex locks and modified ID generation logic, with critical changes in store.go
's Get
method and session decoding flow. The functions were vulnerable because they trusted user input for session identification and lacked proper concurrency controls around session data manipulation.