First published: Fri Jun 21 2013(Updated: )
The Browser in IBM Sterling Connect:Direct 1.4 before 1.4.0.11 and 1.5 through 1.5.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Sterling Connect Direct User Interface | =1.4.0.0 | |
Ibm Sterling Connect Direct User Interface | =1.4.0.2 | |
Ibm Sterling Connect Direct User Interface | =1.4.0.3 | |
Ibm Sterling Connect Direct User Interface | =1.4.0.6 | |
Ibm Sterling Connect Direct User Interface | =1.4.0.7 | |
Ibm Sterling Connect Direct User Interface | =1.4.0.10 | |
Ibm Sterling Connect Direct User Interface | =1.5.0.0 | |
Ibm Sterling Connect Direct User Interface | =1.5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.