Lucene search

K
ibmIBMA01DBE79BC12C8FAC53803FC444066208EDE373FFEBD9682DD18A40499F682E6
HistorySep 26, 2022 - 3:29 a.m.

Security Bulletin: IBM Sterling Secure Proxy’s session or sensitive cookies do not have the secure attribute enabled (CVE-2013-0515)

2022-09-2603:29:56
www.ibm.com
11
ibm sterling secure proxy
cookies
secure attribute
vulnerability
http
fix
affected products

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.017

Percentile

87.6%

Abstract

IBM Sterling Secure Proxy’s session or sensitive cookies do not always have the secure attribute enabled. As a result, customers who use HTTP could be vulnerable to cookie hijacking attacks.

Content

VULNERABILITY DETAILS ** ** **CVE ID:******CVE-2013-0515

**DESCRIPTION:******Set Secure Attribute in SSL Cookie
IBM Sterling Secure Proxy Configuration Manager may, in some circumstances, not set the Secure attribute when it creates a session or sensitive cookies. The secure attribute is used to ensure that cookies (with the attribute set) can only be sent in an encrypted channel to reduce the likelihood of eavesdropping attacks.
** *CVSS:
CVSS Base Score: 2.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83432 for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

AFFECTED PRODUCTS:

Sterling Secure Proxy 3.4.1
Sterling Secure Proxy 3.4.0
Sterling Secure Proxy 3.3.01
Sterling Secure Proxy 3.2.0

REMEDIATION:

VENDOR FIXES:

IBM Sterling Secure Proxy 3.4.1: Apply Fix Pack 3.4.1.7 Interim Fix 2 (iFix 2)
IBM Sterling Secure Proxy 3.4.0: Apply 3.4.0.6 iFix 2 or Fix Pack 3.4.1.7 iFix 2
IBM Sterling Secure Proxy 3.3.01: Apply 3.3.01.23 iFix 1 or Fix Pack 3.4.1.7 iFix 2
IBM Sterling Secure Proxy 3.2.0: No fix available. Product goes off support 6/30/2013. Customers on releases prior to SSP 3.3.01 should apply 3.3.01.23 iFix 1 or Fix Pack 3.4.1.7 iFix 2

WORKAROUND(S):
Use Secure HTTP (HTTPS) on all pages until the fix can be applied.

MITIGATION(S):
None known.

ADDITIONAL INFORMATION:

The fixes listed above for IBM Sterling Secure Proxy also contains fixes for the following previously reported and fixed vulnerabilities.

Title CVE ID Link
Jetty hashtable denial of service CVE-2011-4461 http://www-01.ibm.com/support/docview.wss? uid=swg21611931
Application Pages Do Not Break Out of 3rd Party HTML Frames. CVE-2013-0518 http://www-01.ibm.com/support/docview.wss? uid=swg21636369
Version Information Revealed In Page Title. CVE-2013-0519 http://www-01.ibm.com/support/docview.wss? uid=swg21636369
Inadequate Application Error Handling and Suppression CVE-2013-0520 http://www-01.ibm.com/support/docview.wss? uid=swg21636369

REFERENCES:
Complete CVSS Guide
On-line Calculator V2
CVE-2013-0515
X-Force Vulnerability 83432

RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

CHANGE HISTORY
21 June 2013 Original Copy Published

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“SS6PNW”,“label”:“IBM Sterling Secure Proxy”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“–”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF010”,“label”:“HP-UX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“3.4;3.3.1;3.3”,“Edition”:“”,“Line of Business”:{“code”:“LOB59”,“label”:“Sustainability Software”}}]

Affected configurations

Vulners
Node
ibmsterling_secure_proxyMatch3.4
OR
ibmsterling_secure_proxyMatch3.3.1
OR
ibmsterling_secure_proxyMatch3.3
VendorProductVersionCPE
ibmsterling_secure_proxy3.4cpe:2.3:a:ibm:sterling_secure_proxy:3.4:*:*:*:*:*:*:*
ibmsterling_secure_proxy3.3.1cpe:2.3:a:ibm:sterling_secure_proxy:3.3.1:*:*:*:*:*:*:*
ibmsterling_secure_proxy3.3cpe:2.3:a:ibm:sterling_secure_proxy:3.3:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.017

Percentile

87.6%

Related for A01DBE79BC12C8FAC53803FC444066208EDE373FFEBD9682DD18A40499F682E6