Session Fixation Affecting pwpush package, versions >=0.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-PWPUSH-8553973
  • published31 Dec 2024
  • disclosed30 Dec 2024
  • creditPositive Technologies

Introduced: 30 Dec 2024

NewCVE-2024-56733  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

There is no fixed version for pwpush.

Overview

Affected versions of this package are vulnerable to Session Fixation where an attacker can copy the session cookie before a user logs out.

Note: This is only exploitable if the attacker manages to capture the session cookie before the log out process.

Workaround

Self-hosting users are advised to ensure Password Pusher is hosted exclusively over SSL connections to encrypt traffic and prevent session cookies from being intercepted in transit.

References

CVSS Scores

version 4.0
version 3.1