First published: Thu Mar 14 2024(Updated: )
IBM Sterling Secure Proxy 6.0.3 and 6.1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 269683.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Secure Proxy | <=6.0.3 | |
IBM Secure Proxy | <=6.1.0 | |
IBM Sterling Secure Proxy | =6.0.3 | |
IBM Sterling Secure Proxy | =6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46179 is a medium severity vulnerability due to its potential for exposing session cookies and authorization tokens.
To fix CVE-2023-46179, upgrade IBM Sterling Secure Proxy to version 6.0.4 or 6.1.1 or later, which includes patches that set the secure attribute on cookies.
CVE-2023-46179 affects IBM Sterling Secure Proxy versions 6.0.3 and 6.1.0.
The risks associated with CVE-2023-46179 include potential cookie theft leading to unauthorized access to user sessions.
There are no recommended workarounds for CVE-2023-46179; applying the appropriate patch is the only way to fully mitigate the risk.