A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
                
            References
                    | Link | Resource | 
|---|---|
| https://my.f5.com/manage/s/article/K000148232 | Mitigation Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2024-11-06 17:15
Updated : 2024-11-08 19:51
NVD link : CVE-2024-10318
Mitre link : CVE-2024-10318
CVE.ORG link : CVE-2024-10318
JSON object : View
Products Affected
                f5
- nginx_api_connectivity_manager
- nginx_openid_connect
- nginx_ingress_controller
- nginx_instance_manager
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
