First published: Wed Jul 24 2024(Updated: )
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Directory Integrator | ||
IBM Security Verify Directory Integrator | ||
IBM Security Verify Directory Integrator | <=7.2.0 | |
IBM Security Verify Directory Integrator | <=10.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28771 is classified with a significant severity due to the potential for session hijacking.
To fix CVE-2024-28771, ensure that the secure attribute is set on all authorization tokens and session cookies.
CVE-2024-28771 affects IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0.
Yes, CVE-2024-28771 can potentially lead to unauthorized data access through session theft by attackers.
For CVE-2024-28771, a potential workaround is to use secure connections and sanitize user inputs to avoid malicious links.