Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-1848

Опубликовано: 14 мая 2015
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:fedora:pacemaker_configuration_system:*:*:*:*:*:*:*:*
Версия до 0.9.137 (включая)
Конфигурация 2

Одно из

cpe:2.3:o:redhat:enterprise_linux_high_availability:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability_eus:6.6.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage_eus:6.6.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage_eus:7.1:*:*:*:*:*:*:*

EPSS

Процентиль: 79%
0.0121
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-310

Связанные уязвимости

redhat
больше 10 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

debian
больше 10 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secu ...

github
больше 3 лет назад

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

EPSS

Процентиль: 79%
0.0121
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-310