First published: Tue Aug 09 2011(Updated: )
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | <=1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2224 is classified as a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To address CVE-2011-2224, you should update to Novell Mobility Pack version 1.2 or later, or apply any available patches.
CVE-2011-2224 affects Novell Mobility Pack versions prior to 1.2 and Novell Data Synchronizer versions 1.1.0 through 1.1.2.
CVE-2011-2224 is a cross-site scripting (XSS) vulnerability that exploits the absence of the HTTPOnly flag in the Set-Cookie header.
Organizations using affected versions of Novell Mobility Pack and Novell Data Synchronizer are vulnerable to CVE-2011-2224.