CVE-2024-7341: Session Fixation
A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.
AI Analysis
Technical Summary
This vulnerability involves session fixation in the Elytron SAML adapters used by Keycloak, where the session ID and JSESSIONID cookie remain unchanged at login time despite configuration settings intended to prevent this. An attacker who obtains a valid session before authentication can exploit this flaw to maintain control over the session after login, potentially leading to unauthorized access. The issue affects Red Hat Single Sign-On 7.6 versions on RHEL 7 and RHEL 8. Red Hat has issued security advisories RHSA-2024:6493 and RHSA-2024:6494, releasing updated packages (7.6.10) that fix this vulnerability.
Potential Impact
The vulnerability allows an attacker to perform session fixation by hijacking a session prior to authentication and maintaining control over it after login. This can lead to unauthorized access with the privileges of the authenticated user. The CVSS v3.1 base score is 7.1 (High), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges and user interaction.
Mitigation Recommendations
Red Hat has released updated packages for Red Hat Single Sign-On 7.6.10 on RHEL 7 and RHEL 8 that address this session fixation vulnerability. Users should apply these security updates promptly. Before applying the update, ensure all previously released errata relevant to the system are applied. Refer to Red Hat's official guidance at https://access.redhat.com/articles/11258 for update procedures. No additional mitigation steps are indicated by the vendor advisory.
CVE-2024-7341: Session Fixation
Description
A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves session fixation in the Elytron SAML adapters used by Keycloak, where the session ID and JSESSIONID cookie remain unchanged at login time despite configuration settings intended to prevent this. An attacker who obtains a valid session before authentication can exploit this flaw to maintain control over the session after login, potentially leading to unauthorized access. The issue affects Red Hat Single Sign-On 7.6 versions on RHEL 7 and RHEL 8. Red Hat has issued security advisories RHSA-2024:6493 and RHSA-2024:6494, releasing updated packages (7.6.10) that fix this vulnerability.
Potential Impact
The vulnerability allows an attacker to perform session fixation by hijacking a session prior to authentication and maintaining control over it after login. This can lead to unauthorized access with the privileges of the authenticated user. The CVSS v3.1 base score is 7.1 (High), reflecting network attack vector, high impact on confidentiality, integrity, and availability, and requiring low privileges and user interaction.
Mitigation Recommendations
Red Hat has released updated packages for Red Hat Single Sign-On 7.6.10 on RHEL 7 and RHEL 8 that address this session fixation vulnerability. Users should apply these security updates promptly. Before applying the update, ensure all previously released errata relevant to the system are applied. Refer to Red Hat's official guidance at https://access.redhat.com/articles/11258 for update procedures. No additional mitigation steps are indicated by the vendor advisory.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-07-31T15:13:22.220Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69156c928f1a6240445ae4a8
Added to database: 11/13/2025, 5:28:50 AM
Last enriched: 4/4/2026, 10:43:27 AM
Last updated: 5/9/2026, 9:23:49 AM
Views: 218
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.