First published: Fri Mar 29 2013(Updated: )
IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 includes a security test that sends session cookies to a specific external server, which allows man-in-the-middle attackers to hijack the test account by capturing these cookies.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security AppScan | =5.6.0.0 | |
IBM Security AppScan | =8.0.0.0 | |
IBM Security AppScan | =8.0.0.1 | |
IBM Security AppScan | =8.0.0.2 | |
IBM Security AppScan | =8.0.1.0 | |
IBM Security AppScan | =8.0.1.1 | |
IBM Security AppScan | =8.0.11 | |
IBM Security AppScan | =8.5.0.0 | |
IBM Security AppScan | =8.5.0.1 | |
IBM Security AppScan | =8.6.0.0 | |
IBM Security AppScan | =8.6.0.1 | |
IBM Security AppScan | =8.6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-0510 is considered medium, due to the risk of session cookie hijacking.
To fix CVE-2013-0510, upgrade IBM Security AppScan Enterprise to version 8.7 or later.
IBM Security AppScan Enterprise versions 5.6 and 8.0.x before 8.7 are affected by CVE-2013-0510.
CVE-2013-0510 enables man-in-the-middle attacks by allowing attackers to capture session cookies.
Exploiting CVE-2013-0510 can lead to unauthorized access to user accounts and sensitive data.