### [CVE-2018-12538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12538) ![](https://img.shields.io/static/v1?label=Product&message=Eclipse%20Jetty&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%209.4.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-6%3A%20J2EE%20Misconfiguration%3A%20Insufficient%20Session-ID%20Length&color=brighgreen) ### Description In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html #### Github - https://github.com/Anonymous-Phunter/PHunter - https://github.com/CGCL-codes/PHunter