Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain.
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00832.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00794.html
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00761.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/54472
http://www.securityfocus.com/bid/37162
http://secunia.com/advisories/37728
http://secunia.com/advisories/37546
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000177.html
http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html
http://blog.bestpractical.com/2009/11/session-fixation-vulnerability.html
http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch
http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch
http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch
http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch