Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3155

Опубликовано: 27 апр. 2015
Источник: redhat
CVSS2: 2.6

Описание

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

It was found that Foreman did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenStack ForemanforemanWill not fix
Red Hat OpenStack Platform 4foremanWill not fix
Red Hat Satellite 6.1aopallianceFixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1apache-commons-codec-eap6FixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1apache-mime4jFixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1atinjectFixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1bouncycastleFixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1c3p0FixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1candlepinFixedRHSA-2015:159212.08.2015
Red Hat Satellite 6.1candlepin-commonFixedRHSA-2015:159212.08.2015

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1216035foreman: the _session_id cookie is issued without the Secure flag

2.6 Low

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

debian
около 10 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id ...

github
больше 3 лет назад

Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

2.6 Low

CVSS2