First published: Fri Jul 12 2024(Updated: )
IBM Datacap Navigator does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Datacap | <=All | |
IBM Datacap | <=9.1.5 | |
IBM Datacap | <=9.1.6 | |
IBM Datacap | <=9.1.7 | |
IBM Datacap | <=9.1.8 | |
IBM Datacap | <=9.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-124651 is categorized as a medium severity vulnerability due to its potential to expose sensitive cookie data.
To fix CVE-2024-124651, ensure that the secure attribute is set on all session cookies and authorization tokens for IBM Datacap Navigator.
CVE-2024-124651 affects all versions of IBM Datacap Navigator and versions up to 9.1.9 of IBM Datacap.
The risks include potential exposure of session cookies to attackers, leading to unauthorized access and session hijacking.
Yes, CVE-2024-124651 can be exploited remotely through crafted HTTP links that target users.