{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7053","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2024-07-23T19:34:05.033Z","datePublished":"2025-03-20T10:11:16.240Z","dateUpdated":"2025-03-20T13:16:31.805Z"},"containers":{"cna":{"title":"Session Fixation in open-webui/open-webui","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2025-03-20T10:11:16.240Z"},"descriptions":[{"lang":"en","value":"A vulnerability in open-webui/open-webui version 0.3.8 allows an attacker with a user-level account to perform a session fixation attack. The session cookie for all users is set with the default `SameSite=Lax` and does not have the `Secure` flag enabled, allowing the session cookie to be sent over HTTP to a cross-origin domain. An attacker can exploit this by embedding a malicious markdown image in a chat, which, when viewed by an administrator, sends the admin's session cookie to the attacker's server. This can lead to a stealthy administrator account takeover, potentially resulting in remote code execution (RCE) due to the elevated privileges of administrator accounts."}],"affected":[{"vendor":"open-webui","product":"open-webui/open-webui","versions":[{"version":"unspecified","status":"affected","versionType":"custom","lessThanOrEqual":"latest"}]}],"references":[{"url":"https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N","baseScore":7.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}],"source":{"advisory":"947f8191-0abf-4adf-b7c4-d4c19683aba2","discovery":"EXTERNAL"}},"adp":[{"references":[{"url":"https://huntr.com/bounties/947f8191-0abf-4adf-b7c4-d4c19683aba2","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-20T13:16:27.673140Z","id":"CVE-2024-7053","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-20T13:16:31.805Z"}}]}}