Airtime Vulnerability
Session cookie weakness could allow unauthorized account access
Published: July 16th, 2014
Affected Software: Airtime 1.6.0 - 2.5.1
CVE number: CVE-2014-4915
Severity: Medium
Reporter: Albert Santoni (Sourcefabric, Airtime Team)
User accounts, as implemented in Airtime 1.6.0 - 2.5.1, allow a remote attacker to spoof a session belonging to a different Airtime installation running on the same web server.
Airtime accounts on web servers hosting multiple Airtime installations can be spoofed. Web servers hosting single Airtime installations are not affected.
Download and upgrade to Airtime 2.5.1a. Updated Debian packages are available today.
Airtime 2.5.1 installations may be patched with the patch here.
[1] Airtime - the open source radio automation software
[2] Airtime 2.5.1 CVE-2014-4915 Session pinning patch
It looks like you're new here. If you want to get involved, click one of these buttons!