CVE-2020-15950
📋 TL;DR
CVE-2020-15950 is an improper session management vulnerability in Immuta v2.8.2 where user sessions remain active after logout, allowing session hijacking. This affects all Immuta v2.8.2 deployments with default configurations. Attackers can potentially access authenticated sessions if they obtain session tokens.
💻 Affected Systems
- Immuta
📦 What is this software?
Immuta by Immuta
⚠️ Risk & Real-World Impact
Worst Case
Attackers hijack active admin sessions, gaining full administrative control over the Immuta platform, potentially accessing sensitive data, modifying policies, or compromising the entire system.
Likely Case
Attackers hijack user sessions to access unauthorized data or perform actions within the compromised user's permissions, leading to data exposure or policy violations.
If Mitigated
With proper network segmentation and monitoring, impact is limited to unauthorized access within the compromised user's scope, with detection of anomalous session activity.
🎯 Exploit Status
Exploitation requires obtaining valid session tokens through other means (XSS, MITM, token leakage), but once obtained, session hijacking is trivial.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.8.3 or later
Vendor Advisory: https://www.immuta.com/security-advisories/
Restart Required: Yes
Instructions:
1. Upgrade Immuta to v2.8.3 or later. 2. Follow Immuta's upgrade documentation. 3. Restart all Immuta services. 4. Verify session invalidation works correctly.
🔧 Temporary Workarounds
Session Timeout Reduction
allReduce session timeout values to minimize window for session hijacking
Configure session.timeout in Immuta configuration to lowest acceptable value (e.g., 15 minutes)
Force Logout All Users
allInvalidate all active sessions and require re-authentication
Execute session cleanup script or restart authentication service
🧯 If You Can't Patch
- Implement network segmentation to restrict access to Immuta only from trusted networks
- Deploy WAF with session fixation protection and monitor for abnormal session patterns
🔍 How to Verify
Check if Vulnerable:
Check Immuta version via admin interface or configuration files. If version is exactly 2.8.2, system is vulnerable.
Check Version:
Check Immuta web interface admin panel or configuration files for version information
Verify Fix Applied:
After patching: 1. Log in as test user. 2. Log out. 3. Attempt to reuse session token - should be rejected. 4. Verify version shows 2.8.3 or later.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from same session ID after logout
- Session tokens being used from unexpected IP addresses
- Unusually long session durations
Network Indicators:
- Reuse of session cookies after logout requests
- Authentication requests without corresponding logout invalidation
SIEM Query:
source="immuta" AND (event="session_reuse" OR (event="login" AND session_age > 3600))