Vulnerability CVE-2021-40642


Published: 2022-06-29

Description:
Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.

Type:

CWE-565

(Reliance on Cookies without Validation and Integrity Checking)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Textpattern -> Textpattern 

 References:
https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9
https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/

Copyright 2024, cxsecurity.com

 

Back to Top