3.6

CVE-2021-34428

For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
EclipseJetty Version <= 9.4.40
EclipseJetty Version >= 10.0.0 <= 10.0.2
EclipseJetty Version >= 11.0.0 <= 11.0.2
DebianDebian Linux Version10.0
NetappActive Iq Unified Manager Version- SwPlatformlinux
NetappActive Iq Unified Manager Version- SwPlatformwindows
NetappE-series Santricity Os Controller Version >= 11.0 <= 11.70.1
NetappE-series Santricity Web Services Version- SwPlatformweb_services_proxy
NetappSnapmanager Version- SwPlatformsap
OracleCommunications Session Report Manager Version >= 8.0.0.0 <= 8.2.4.0
OracleCommunications Session Route Manager Version >= 8.0.0 <= 8.2.4.0
OracleRest Data Services SwEdition- Version < 21.3
OracleSiebel Core - Automation Version <= 21.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.51% 0.654
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 3.5 0.9 2.5
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:P/I:P/A:N
emo@eclipse.org 2.9 0.4 2.5
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."