Published:2018/10/12 Last Updated:2018/10/12
JVN#49995005
OpenAM (Open Source Edition) vulnerable to session management
Overview
OpenAM (Open Source Edition) contains a vulnerability in session management.
Products Affected
- OpenAM (Open Source Edition) 13.0 and later
Description
OpenAM (Open Source Edition) contains a vulnerability in session management.
Impact
A user who can login to the product may change the security questions and reset the login password.
Solution
Apply the Patch
Patch for this vulnerability has been released by OpenAM Consortium.
Apply the patch according to the information provided by OpenAM Consortium.
Apply a Workaround
The following workaround may mitigate the effects of this vulnerability.
- Disable the Security Questions function for password resetting
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
FUJITSU LIMITED | Not Vulnerable | 2018/10/12 | |
OGIS-RI Co.,Ltd. | Vulnerable | 2018/10/12 | |
Open Source Solution Technology Corporation | Vulnerable | 2018/10/12 | Open Source Solution Technology Corporation website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Base Score:
5.0
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:N/AC:L/Au:S/C:P/I:N/A:N
Base Score:
4.0
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Yasushi Iwakata of Open Source Solution Technology Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2018-0696 |
JVN iPedia |
JVNDB-2018-000107 |