Vulnerability Details CVE-2020-10714
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.1
Products affected by CVE-2020-10714
-
cpe:2.3:a:netapp:oncommand_insight:-
-
cpe:2.3:a:redhat:codeready_studio:12.0
-
cpe:2.3:a:redhat:descision_manager:7.0
-
cpe:2.3:a:redhat:jboss_fuse:7.0.0
-
cpe:2.3:a:redhat:process_automation:7.0
-
cpe:2.3:a:redhat:wildfly_elytron:-
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.5
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.6
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.7
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.8
-
cpe:2.3:a:redhat:wildfly_elytron:1.0.9
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.10
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.11
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.12
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.5
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.6
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.7
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.8
-
cpe:2.3:a:redhat:wildfly_elytron:1.1.9
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.10
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.11
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.12
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.13
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.14
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.5
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.6
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.7
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.8
-
cpe:2.3:a:redhat:wildfly_elytron:1.10.9
-
cpe:2.3:a:redhat:wildfly_elytron:1.11.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.11.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.11.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.2.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.2.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.2.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.2.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.2.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.3.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.3.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.3.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.3.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.4.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.4.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.5.5
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.1
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.2
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.3
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.4
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.5
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.6
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.7
-
cpe:2.3:a:redhat:wildfly_elytron:1.6.8
-
cpe:2.3:a:redhat:wildfly_elytron:1.7.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.8.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.9.0
-
cpe:2.3:a:redhat:wildfly_elytron:1.9.1