CVE-2015-1848

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fedora:pacemaker_configuration_system:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_high_availability:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability_eus:6.6.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_high_availability_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage_eus:6.6.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_resilient_storage_eus:7.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:26

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0980.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0980.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-0990.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0990.html - Third Party Advisory
References () http://www.securityfocus.com/bid/74623 - Third Party Advisory () http://www.securityfocus.com/bid/74623 - Third Party Advisory
References () https://bugzilla.redhat.com/attachment.cgi?id=1009855 - Exploit, Issue Tracking () https://bugzilla.redhat.com/attachment.cgi?id=1009855 - Exploit, Issue Tracking

07 Nov 2023, 02:24

Type Values Removed Values Added
Summary The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag. The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

Information

Published : 2015-05-14 14:59

Updated : 2024-11-21 02:26


NVD link : CVE-2015-1848

Mitre link : CVE-2015-1848

CVE.ORG link : CVE-2015-1848


JSON object : View

Products Affected

redhat

  • enterprise_linux_high_availability
  • enterprise_linux_high_availability_eus
  • enterprise_linux_resilient_storage
  • enterprise_linux_resilient_storage_eus

fedora

  • pacemaker_configuration_system
CWE
CWE-310

Cryptographic Issues