The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.
CPE | Name | Operator | Version |
---|---|---|---|
pacemaker_configuration_system | le | 0.9.137 |
rhn.redhat.com/errata/RHSA-2015-0980.html
rhn.redhat.com/errata/RHSA-2015-0990.html
www.securityfocus.com/bid/74682
bugzilla.redhat.com/attachment.cgi?id=1009855
lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html