Preface: In session hijacking, an attacker gets hold of a valid user session to gain unauthorized access to the account. This is typically done through three methods:
Brute force: The attacker keeps trying session IDs until they are successful.
Calculation: If the session IDs are generated in a non-random manner, the attacker can calculate them.
Theft: The attacker acquires the session ID through techniques like session sniffing, session fixation, and cross-site scripting.
Background: FortiSOAR helps IT/OT security teams thwart attacks by centralizing incident management and automating the myriad of analyst activities required for effective threat investigation and response.
Vulnerability details: An improper authorization vulnerability [CWE-285] in FortiSOAR version 7.4.0 through 7.4.3, 7.3.0 through 7.3.2, 7.2.0 through 7.2.2, 7.0.0 through 7.0.3 change password endpoint may allow an authenticated attacker to perform a brute force attack on users and administrators password via crafted HTTP requests.
Official announcement: Please refer to the vendor announcement for details –