Insufficient Session Expiration Affecting aiohttp-session package, versions [,2.7.0)
Snyk CVSS
Attack Complexity
High
Threat Intelligence
EPSS
0.05% (21st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-AIOHTTPSESSION-72728
- published 24 Dec 2018
- disclosed 11 Oct 2018
- credit Unknown
Introduced: 11 Oct 2018
CVE-2018-1000814 Open this link in a new tabHow to fix?
Upgrade aiohttp-session to version 2.7.0 or higher.
Overview
aiohttp-session provides sessions for aiohttp.web.
Affected versions of this package are vulnerable to Insufficient Session Expiration
via the EncryptedCookieStorage
and NaClCookieStorage
functions that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value.