Vulnerability CVE-2008-3663


Published: 2008-09-24   Modified: 2012-02-12

Description:
Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Squirrelmail: Session hijacking vulnerability
Hanno B
23.09.2008

Type:

CWE-310

(Cryptographic Issues)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Squirrelmail -> Squirrelmail 

 References:
http://int21.de/cve/CVE-2008-3663-squirrelmail.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://securityreason.com/securityalert/4304
http://support.apple.com/kb/HT3438
http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html
http://www.securityfocus.com/archive/1/496601/100/0/threaded
http://www.securityfocus.com/bid/31321
https://exchange.xforce.ibmcloud.com/vulnerabilities/45700
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548

Copyright 2024, cxsecurity.com

 

Back to Top