BIT-codeigniter-2022-46170

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/codeigniter/BIT-codeigniter-2022-46170.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-codeigniter-2022-46170
Aliases
Published
2024-03-06T10:51:18.690Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to DatabaseHandler, MemcachedHandler, or RedisHandler, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.

Database specific
{
    "cpes": [
        "cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / codeigniter

Package

Name
codeigniter
Purl
pkg:bitnami/codeigniter

Severity

  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
4.0.0
Fixed
4.2.11