The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0980.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-0990.html - | |
References | () http://www.securityfocus.com/bid/74682 - | |
References | () https://bugzilla.redhat.com/attachment.cgi?id=1009855 - |
Information
Published : 2015-05-14 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-3983
Mitre link : CVE-2015-3983
CVE.ORG link : CVE-2015-3983
JSON object : View
Products Affected
fedora
- pacemaker_configuration_system
CWE
CWE-310
Cryptographic Issues