First published: Tue Feb 17 2015(Updated: )
noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/noVNC | <0.5.1 | 0.5.1 |
Novell Kanaka | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7436 is classified as a medium severity vulnerability.
To fix CVE-2013-7436, upgrade to noVNC version 0.5.1 or later.
CVE-2013-7436 allows remote attackers to capture an insecure cookie during transmission in an HTTPS session.
CVE-2013-7436 affects noVNC versions prior to 0.5.1, including version 0.4.
CVE-2013-7436 was reported by Paul McMillan.