First published: Wed Sep 24 2008(Updated: )
Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libreport-plugin-mantisbt | =1.2.0a1 | |
CentOS Libreport-plugin-mantisbt | =1.2.0a2 | |
CentOS Libreport-plugin-mantisbt | =1.1.0 | |
CentOS Libreport-plugin-mantisbt | =1.1.2 | |
CentOS Libreport-plugin-mantisbt | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3102 is classified as a medium severity vulnerability due to potential exposure of session cookies.
To fix CVE-2008-3102, ensure that the secure flag is set for session cookies in Mantis versions affected by this vulnerability.
CVE-2008-3102 affects MantisBT versions 1.1.0 through 1.1.2 and 1.2.0a2.
The risks associated with CVE-2008-3102 include the potential for remote attackers to capture session cookies, leading to session hijacking.
Yes, CVE-2008-3102 can affect both http and https sessions because cookies may be sent over insecure connections.