CVE-2020-5205
low-risk
Published 2020-01-09
In Pow (Hex package) before 1.0.16, the use of Plug.Session in Pow.Plug.Session is susceptible to session fixation attacks if a persistent session store is used for Plug.Session, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability.
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Pow
Affected Vendors
References (6)
Third Party Advisory
https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07
Third Party Advisory
https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw
Third Party Advisory
https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07
Third Party Advisory
https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw
26
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal