session fixation in kubeoperator/kubepi
Valid
Reported on
Jan 6th 2023
Description
A session fixation attack allows an attacker to hijack a legitimate user session. The attack investigates a flaw in how the online application handles the session ID, especially the susceptible web application.
Proof of Concept
https://drive.google.com/drive/folders/1n6Dgr2h6LqYr8OkvcvSVvfU_HA71GyFU?usp=sharing
Impact
A successful session fixation attack gives the attacker access to the victim's account. This could mean access to higher level privileges or the ability to look at sensitive data.
We are processing your report and will contact the
kubeoperator/kubepi
team within 24 hours.
3 months ago
We have contacted a member of the
kubeoperator/kubepi
team and are waiting to hear back
3 months ago
The researcher's credibility has increased: +7
Hello Team, Thanks for the respond, Could you kindly assist me in receiving the bounty?
Hello Wanghe, this is a high vulnerability can you please assign CVE
to join this conversation