CVE-2010-0756

WikyBlog 1.7.3 rc2 - Session Fixation

Title source: llm
STIX 2.1

Description

Session fixation vulnerability in WikyBlog 1.7.3 rc2 allows remote attackers to hijack web sessions by setting the jsessionid parameter to (1) index.php/Comment/Main, (2) index.php/Comment/Main/Home_Wiky, or (3) index.php/Edit/Main.

Exploits (1)

exploitdb WORKING POC VERIFIED
by indoushka · textwebappsphp
https://www.exploit-db.com/exploits/11560

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56594
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/38386
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/11560

Scores

EPSS 0.0069
EPSS Percentile 72.0%

Details

CWE
CWE-287
Status published
Products (1)
wikyblog/wikyblog 1.7.3 rc2
Published Feb 27, 2010
Tracked Since Feb 18, 2026