CVE-2021-40642

Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
Configurations

Configuration 1 (hide)

cpe:2.3:a:textpattern:textpattern:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:24

Type Values Removed Values Added
References () https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 - Patch, Third Party Advisory () https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 - Patch, Third Party Advisory
References () https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/ - Permissions Required, Third Party Advisory () https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/ - Permissions Required, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-565 CWE-311

Information

Published : 2022-06-29 11:15

Updated : 2024-11-21 06:24


NVD link : CVE-2021-40642

Mitre link : CVE-2021-40642

CVE.ORG link : CVE-2021-40642


JSON object : View

Products Affected

textpattern

  • textpattern
CWE
CWE-311

Missing Encryption of Sensitive Data