First published: Tue Jun 06 2023(Updated: )
IBM CICS TX does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM CICS TX Advanced | <=10.1 | |
IBM CICS TX Advanced | <=11.1 | |
IBM TXSeries for Multiplatform | =8.1 | |
IBM AIX | ||
Linux Linux kernel | ||
IBM TXSeries for Multiplatform | >=8.2<8.2.0.2 | |
HP HP-UX | ||
IBM TXSeries for Multiplatform | >=9.1<9.1.0.2 | |
IBM CICS TX | =10.1 | |
IBM CICS TX | =11.1 | |
IBM CICS TX | =11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-33847.
The severity level of CVE-2023-33847 is low with a CVSS score of 3.7.
The software products affected by this vulnerability are IBM TXSeries for Multiplatforms (version 8.1, 8.2, 9.1), CICS TX Advanced (version 10.1, 11.1), and CICS TX Standard (version 11.1).
An attacker can exploit this vulnerability by sending a http:// link to a user or by planting this link in a site.
To fix CVE-2023-33847, apply the patches provided by IBM for the affected software versions.