First published: Tue Apr 28 2015(Updated: )
It was reported that the _session_id cookie in Foreman is set without the Secure flag. This may allow an attacker to perform a "session hijacking" attack. Upstream bug: <a href="http://projects.theforeman.org/issues/10275">http://projects.theforeman.org/issues/10275</a> Proposed fix: <a href="https://github.com/theforeman/foreman/pull/2328">https://github.com/theforeman/foreman/pull/2328</a>
Affected Software | Affected Version | How to fix |
---|---|---|
The Foreman |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1216035 is classified as high due to the potential for session hijacking.
To fix REDHAT-BUG-1216035, ensure that the _session_id cookie is set with the Secure flag enabled.
REDHAT-BUG-1216035 affects the Foreman application by The Foreman.
Yes, REDHAT-BUG-1216035 can lead to data breaches through unauthorized access by attackers via session hijacking.
A workaround for REDHAT-BUG-1216035 is to manually set the Secure flag on the _session_id cookie until an official patch is applied.