Lucene search

K
freebsdFreeBSD00D6040A-B8E0-11DD-A578-0030843D3802
HistoryOct 14, 2008 - 12:00 a.m.

mantis -- session hijacking vulnerability

2008-10-1400:00:00
vuxml.freebsd.org
8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.5%

The mantis Team reports:

When configuring a web application to use only ssl (e. g. by
forwarding all http-requests to https), a user would expect that
sniffing and hijacking the session is impossible.
Though, for this to be secure, one needs to set the session cookie to
have the secure flag. Else the cookie will be transferred through http
if the victim’s browser does a single http-request on the same domain.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchmantis< 1.1.3UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.5%