Lucene search

K
cve[email protected]CVE-2015-1848
HistoryMay 14, 2015 - 2:59 p.m.

CVE-2015-1848

2015-05-1414:59:07
CWE-310
web.nvd.nist.gov
26
cve-2015-1848
pcs daemon
pcsd
cookie capture
interception
secure flag
https session
vulnerability

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.2 Medium

AI Score

Confidence

Low

0.026 Low

EPSS

Percentile

90.4%

The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.

Affected configurations

NVD
Node
fedorapacemaker_configuration_systemRange0.9.137
Node
redhatenterprise_linux_high_availabilityMatch6.0
OR
redhatenterprise_linux_high_availabilityMatch7.0
OR
redhatenterprise_linux_high_availability_eusMatch6.6.z
OR
redhatenterprise_linux_high_availability_eusMatch7.1
OR
redhatenterprise_linux_resilient_storageMatch6.0
OR
redhatenterprise_linux_resilient_storageMatch7.0
OR
redhatenterprise_linux_resilient_storage_eusMatch6.6.z
OR
redhatenterprise_linux_resilient_storage_eusMatch7.1

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.2 Medium

AI Score

Confidence

Low

0.026 Low

EPSS

Percentile

90.4%