First published: Thu Sep 18 2008(Updated: )
Gallery before 1.5.9, and 2.x before 2.2.6, does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NotFound Gallery | <=2.2.5 | |
NotFound Gallery | =2.2.0 | |
NotFound Gallery | =2.2.1 | |
NotFound Gallery | =2.2.2 | |
NotFound Gallery | =2.2.3 | |
NotFound Gallery | =2.2.4 | |
NotFound Gallery | <=1.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3662 has a moderate severity rating due to the risk of session cookie interception.
To fix CVE-2008-3662, update Gallery to version 1.5.9 or 2.2.6 or later.
CVE-2008-3662 can be exploited by attackers using session hijacking techniques.
CVE-2008-3662 affects Gallery versions prior to 1.5.9 and 2.x versions before 2.2.6.
Yes, the session cookie may be sent over non-HTTPS connections, making it vulnerable to interception.