First published: Wed Jul 24 2024(Updated: )
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Integrator | ||
IBM Security Verify Directory Integrator | ||
IBM Security Directory Integrator | <=7.2.0 | |
IBM Security Verify Directory Integrator | <=10.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28770 has a high severity due to the potential exposure of sensitive session cookies.
To fix CVE-2024-28770, ensure that the secure attribute is set on all authorization tokens and session cookies.
CVE-2024-28770 affects IBM Security Directory Integrator version 7.2.0 and IBM Security Verify Directory Integrator version 10.0.0.
The implications of CVE-2024-28770 include the possibility of attackers stealing session cookies, leading to session hijacking.
While it's recommended to apply the fix for CVE-2024-28770, a possible workaround includes using an alternative session management approach until the fix can be implemented.