Vulnerability Description
Pi-hole 5.0, 5.1, and 5.1.1 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pi-Hole | Pi-Hole | 5.0 |
Related Weaknesses (CWE)
References
- https://discourse.pi-hole.net/c/announcements/5Release NotesVendor Advisory
- https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ExploitThird Party Advisory
- https://discourse.pi-hole.net/c/announcements/5Release NotesVendor Advisory
- https://n4nj0.github.io/advisories/pi-hole-multiple-vulnerabilities-i/ExploitThird Party Advisory
FAQ
What is CVE-2020-35591?
CVE-2020-35591 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Pi-hole 5.0, 5.1, and 5.1.1 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value a...
How severe is CVE-2020-35591?
CVE-2020-35591 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-35591?
Check the references section above for vendor advisories and patch information. Affected products include: Pi-Hole Pi-Hole.