Insufficient Expiration in Progress Sitefinity 4.015.2 Session Fixation
CVE-2024-11627 Published on January 7, 2025
: Insufficient Session Expiration vulnerability in Progress Sitefinity allows : Session Fixation.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421.
Vulnerability Analysis
CVE-2024-11627 can be exploited with network access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Products Associated with CVE-2024-11627
Want to know whenever a new CVE is published for Progress Sitefinity? stack.watch will email you.
Affected Versions
Progress Sitefinity:- Version 4.0, <= 14.4.8142 is affected.
- Version 15.0.8200, <= 15.0.8229 is affected.
- Version 15.1.8300, <= 15.1.8327 is affected.
- Version 15.2.8400, <= 15.2.8421 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.