< go back to overview

Session Fixation

Platform: ownCloud Server

Versions: 6.0.2,

Date: 7/3/2014

Risk level: Medium


Due to authenticating a user without invalidating any existing session identifier an attacker has the opportunity to steal authenticated sessions. A successful exploit requires that PHP is configured to accept session parameters via GET.

Affected Software

  • ownCloud Server < 6.0.2 (CVE-2014-2047)

Action Taken

The session is now regenerated after a successful login.


The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:

  • Lukas Reschke – ownCloud Inc. (lukas@owncloud.org) – Vulnerability discovery and disclosure.

Share this

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.