First published: Tue Apr 28 2015(Updated: )
Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TheForeman Foreman | <=1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3155 is classified as a medium severity vulnerability.
To fix CVE-2015-3155, upgrade Foreman to version 1.8.1 or later to ensure the _session_id cookie is set with the secure flag.
CVE-2015-3155 enables remote attackers to capture the _session_id cookie through man-in-the-middle attacks.
Foreman versions up to and including 1.8.0 are affected by CVE-2015-3155.
Yes, CVE-2015-3155 specifically relates to the lack of a secure flag on the _session_id cookie, compromising its security during transmission.