First published: Sun Nov 08 2015(Updated: )
IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Incident Forensics | =7.2.0 | |
IBM QRadar Incident Forensics | =7.2.1 | |
IBM QRadar Incident Forensics | =7.2.2 | |
IBM QRadar Incident Forensics | =7.2.3 | |
IBM QRadar Incident Forensics | =7.2.4 | |
IBM QRadar Incident Forensics | =7.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1994 has been rated as a moderate severity vulnerability.
To fix CVE-2015-1994, upgrade IBM Security QRadar Incident Forensics to version 7.2.5 Patch 5 or later.
CVE-2015-1994 affects IBM Security QRadar Incident Forensics versions 7.2.0 through 7.2.4.
The impact of CVE-2015-1994 is that it allows remote attackers to capture session cookies containing sensitive information.
The HTTPOnly flag helps prevent client-side scripts from accessing session cookies, thus protecting sensitive data against certain types of attacks.