vendor:
WebLogic Server
by:
Roberto Suggi Liverani
7.5
CVSS
HIGH
Session Fixation
384
CWE
Product Name: WebLogic Server
Affected Version From: Oracle WebLogic Server 9.0
Affected Version To: Oracle WebLogic Server 10.3.3
Patch Exists: YES
Related CWE: CVE-2010-4437
CPE: a:oracle:weblogic_server
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=156558, https://www.infosecmatter.com/nessus-plugin-library/?id=46740, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=46741, https://www.infosecmatter.com/exploits-vulnerabilities-and-payloads-practical-introduction/
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
Oracle WebLogic – Session Fixation Via HTTP POST Request
Oracle WebLogic servlet session cookie can be fixated via HTTP POST request. This type of session fixation attack has been confirmed with different session descriptor elements. In particular, the attack has also been confirmed with the session descriptor element <url-rewriting-enabled> set to 'False'. Such setting prevents session fixation attack via HTTP GET request but fails to mitigate session fixation attacks performed over HTTP POST.
Mitigation:
Apply the latest patch provided by the vendor.