A vulnerability classified as problematic has been found in Graylog2 Server up to 5.1.10/5.2.3. Affected is an unknown function of the file /api/system/sessions. The manipulation leads to session fixiation.
This vulnerability is traded as CVE-2024-24823. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.