First published: Tue Sep 23 2008(Updated: )
Drupal, probably 5.10 and 6.4, does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | =5.10 | |
Drupal Drupal | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3661 is considered a medium severity vulnerability due to the risk of session cookies being exposed to attackers.
To fix CVE-2008-3661, ensure that the secure flag is set for session cookies in your Drupal configuration during HTTPS sessions.
CVE-2008-3661 affects Drupal versions 5.10 and 6.4.
The impact of CVE-2008-3661 allows attackers to potentially capture session cookies, leading to unauthorized access.
Yes, upgrading to newer versions of Drupal that properly set the secure flag for session cookies will mitigate CVE-2008-3661.