First published: Wed Oct 27 2021(Updated: )
The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Kiwi Syslog Server | <=9.7.2 |
SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35236 is a vulnerability in Kiwi Syslog Server 9.7.2 and previous versions where the Secure flag is not set in the SSL Cookie.
The Secure flag ensures that the cookie is only sent over a secure channel like HTTPS, making it less susceptible to interception and unauthorized access.
CVE-2021-35236 has a severity rating of medium, with a CVSS score of 5.3.
To fix CVE-2021-35236, upgrade to a version of Kiwi Syslog Server that has the Secure flag set in the SSL Cookie, such as version 9.8 or later.
You can find more information about CVE-2021-35236 in the release notes for Kiwi Syslog Server 9.8 and the SolarWinds security advisories.