First published: Mon Aug 22 2022(Updated: )
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32777 has been classified as a medium severity vulnerability due to its potential for information disclosure.
To fix CVE-2022-32777, ensure that the session and pass cookies have the HttpOnly and Secure flags set.
CVE-2022-32777 affects WWBN AVideo version 11.6 and earlier versions.
CVE-2022-32777 is an information disclosure vulnerability, primarily affecting cookie security.
Yes, CVE-2022-32777 can potentially be exploited remotely due to the exposed session cookies.