The application is vulerable to session fixation attacks, which are exacerbated by the lack of HTTPOnly flag used by the session cookie and the presence of XSS vulnerabilities.
The application does not re-issue session cookies upon a user successfully authenticating. This could allow an attacker to send a user a crafted URL that sets the session cookie (possible due to the presence of potential XSS vulnerabilities). When the user logs in they retain this cookie meaning that the attacker is able to hijack their session because they know the user's valid session ID.
The fix is to have the session ID change when the user logs in.
More details can be found on the OWASP website.
Anonymous
View and moderate all "patches Discussion" comments posted by this user
Mark all as spam, and block user from posting to "Patches"
Hi, this is fixed in development release already I believe, could you check ?
https://github.com/phpipam/phpipam