First published: Thu Jul 07 2016(Updated: )
IBM WebSphere Application Server (WAS) 8.5 through 8.5.5.9 Liberty before Liberty Fix Pack 16.0.0.2 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified JAX-RS API cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Application Server | =8.5.5.0 | |
IBM WebSphere Application Server | =8.5.5.1 | |
IBM WebSphere Application Server | =8.5.5.2 | |
IBM WebSphere Application Server | =8.5.5.3 | |
IBM WebSphere Application Server | =8.5.5.4 | |
IBM WebSphere Application Server | =8.5.5.5 | |
IBM WebSphere Application Server | =8.5.5.6 | |
IBM WebSphere Application Server | =8.5.5.7 | |
IBM WebSphere Application Server | =8.5.5.8 | |
IBM WebSphere Application Server | =8.5.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2923 has a medium severity rating due to its potential risk of sensitive information exposure via insecure cookie handling.
To fix CVE-2016-2923, ensure you update IBM WebSphere Application Server to Liberty Fix Pack 16.0.0.2 or later.
CVE-2016-2923 affects IBM WebSphere Application Server versions 8.5.5.0 to 8.5.5.9.
CVE-2016-2923 is a security vulnerability related to the lack of the HTTPOnly flag in Set-Cookie headers.
Organizations using the affected versions of IBM WebSphere Application Server could be impacted by CVE-2016-2923.