First published: Tue Aug 09 2011(Updated: )
Opera cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7297 is classified as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To mitigate CVE-2008-7297, users should ensure they are using the latest version of the Opera browser, which implements improved cookie security.
CVE-2008-7297 affects users of the Opera browser versions that do not enforce strict cookie handling in HTTPS sessions.
CVE-2008-7297 allows man-in-the-middle attackers to overwrite or delete arbitrary cookies, compromising user sessions.
Yes, CVE-2008-7297 is related to the lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, which could prevent such vulnerabilities.