Vulnerability Name: | CVE-2008-3663 (CCN-45700) | ||||||||||||||||||||||||
Assigned: | 2008-08-12 | ||||||||||||||||||||||||
Published: | 2008-08-12 | ||||||||||||||||||||||||
Updated: | 2018-10-11 | ||||||||||||||||||||||||
Summary: | Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie. | ||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-310 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-3663 Source: CCN Type: Hanno Boeck Advisories, 2008-09-23 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663 Source: MISC Type: UNKNOWN http://int21.de/cve/CVE-2008-3663-squirrelmail.html Source: APPLE Type: UNKNOWN APPLE-SA-2009-02-12 Source: SUSE Type: UNKNOWN SUSE-SR:2008:028 Source: SUSE Type: UNKNOWN SUSE-SR:2009:004 Source: CCN Type: RHSA-2009-0010 Moderate: squirrelmail security update Source: CCN Type: SA33937 Apple Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 33937 Source: SREASON Type: UNKNOWN 4304 Source: CCN Type: Apple Web site About the security content of Security Update 2009-001 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT3438 Source: CCN Type: ASA-2009-009 squirrelmail security update (RHSA-2009-0010) Source: CONFIRM Type: UNKNOWN http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html Source: BUGTRAQ Type: UNKNOWN 20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663 Source: BID Type: UNKNOWN 31321 Source: CCN Type: BID-31321 SquirrelMail Insecure Cookie Disclosure Weakness Source: CCN Type: SquirrelMail Web site Download Distribution Source: XF Type: UNKNOWN squirrelmail-cookie-session-hijacking(45700) Source: XF Type: UNKNOWN squirrelmail-cookie-session-hijacking(45700) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10548 Source: SUSE Type: SUSE-SR:2008:028 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2009:004 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |