Florian Weimer reported a session fixation flaw in Cumin's login procedure. Because Cumin does not reset the session cookie after authentication, an attacker could obtain a session cookie from the server, use loopholes in the browser security model to set the cookie in the victim's browser, and use the victim's session after the victim has logged into the site.
Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
This issue has been addressed in following products: MRG for RHEL-5 v. 2 Via RHSA-2012:1278 https://rhn.redhat.com/errata/RHSA-2012-1278.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:1281 https://rhn.redhat.com/errata/RHSA-2012-1281.html
Created cumin tracking bugs for this issue Affects: fedora-all [bug 858868]