First published: Thu May 14 2015(Updated: )
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pacemaker/Corosync Configuration System | <=0.9.137 | |
Red Hat Enterprise Linux High Availability | =6.0 | |
Red Hat Enterprise Linux High Availability | =7.0 | |
Red Hat Enterprise Linux High Availability EUS | =6.6.z | |
Red Hat Enterprise Linux High Availability EUS | =7.1 | |
Red Hat Enterprise Linux Resilient Storage | =6.0 | |
Red Hat Enterprise Linux Resilient Storage | =7.0 | |
Red Hat Enterprise Linux Resilient Storage EUS | =6.6.z | |
Red Hat Enterprise Linux Resilient Storage EUS | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1848 has been classified as a medium severity vulnerability due to its potential to expose sensitive cookies to attackers.
To fix CVE-2015-1848, update to PCS version 0.9.138 or later, ensuring secure flags are set for cookies in HTTPS sessions.
CVE-2015-1848 affects PCS versions up to 0.9.137 and is relevant for various Red Hat Enterprise Linux and Pacemaker Configuration System installations.
Exploitation of CVE-2015-1848 could allow remote attackers to intercept cookies during HTTP sessions, posing a risk of session hijacking.
A temporary workaround for CVE-2015-1848 includes enforcing HTTPS everywhere and avoiding HTTP for sensitive sessions.