Session Management Flaw in NGINX Controller Webserver by F5
CVE-2020-5894
8.1HIGH
Summary
The NGINX Controller webserver versions 3.0.0 to 3.3.0 has a session management flaw that fails to invalidate the server-side session token after a user logs out. This oversight could allow unauthorized access to user sessions, potentially exposing sensitive information or allowing unauthorized actions within the system. Proper session handling is crucial in safeguarding user data and maintaining the integrity of web applications. Organizations utilizing these affected versions should take immediate actions to mitigate this vulnerability, including upgrading to the latest version where this issue is resolved.
Affected Version(s)
NGINX Controller < 3.4.0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved