CVE-2020-15950

8.8 HIGH

📋 TL;DR

CVE-2020-15950 is an improper session management vulnerability in Immuta v2.8.2 where user sessions remain active after logout, allowing session hijacking. This affects all Immuta v2.8.2 deployments with default configurations. Attackers can potentially access authenticated sessions if they obtain session tokens.

💻 Affected Systems

Products:
  • Immuta
Versions: v2.8.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of Immuta v2.8.2 are affected regardless of configuration. The vulnerability is in the core session management logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers hijack active admin sessions, gaining full administrative control over the Immuta platform, potentially accessing sensitive data, modifying policies, or compromising the entire system.

🟠

Likely Case

Attackers hijack user sessions to access unauthorized data or perform actions within the compromised user's permissions, leading to data exposure or policy violations.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to unauthorized access within the compromised user's scope, with detection of anomalous session activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining valid session tokens through other means (XSS, MITM, token leakage), but once obtained, session hijacking is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.8.3 or later

Vendor Advisory: https://www.immuta.com/security-advisories/

Restart Required: Yes

Instructions:

1. Upgrade Immuta to v2.8.3 or later. 2. Follow Immuta's upgrade documentation. 3. Restart all Immuta services. 4. Verify session invalidation works correctly.

🔧 Temporary Workarounds

Session Timeout Reduction

all

Reduce session timeout values to minimize window for session hijacking

Configure session.timeout in Immuta configuration to lowest acceptable value (e.g., 15 minutes)

Force Logout All Users

all

Invalidate all active sessions and require re-authentication

Execute session cleanup script or restart authentication service

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Immuta only from trusted networks
  • Deploy WAF with session fixation protection and monitor for abnormal session patterns

🔍 How to Verify

Check if Vulnerable:

Check Immuta version via admin interface or configuration files. If version is exactly 2.8.2, system is vulnerable.

Check Version:

Check Immuta web interface admin panel or configuration files for version information

Verify Fix Applied:

After patching: 1. Log in as test user. 2. Log out. 3. Attempt to reuse session token - should be rejected. 4. Verify version shows 2.8.3 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same session ID after logout
  • Session tokens being used from unexpected IP addresses
  • Unusually long session durations

Network Indicators:

  • Reuse of session cookies after logout requests
  • Authentication requests without corresponding logout invalidation

SIEM Query:

source="immuta" AND (event="session_reuse" OR (event="login" AND session_age > 3600))

🔗 References

📤 Share & Export