ID CVE-2009-5051
Summary Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
References
Vulnerable Configurations
  • cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*
  • cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*
    cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm http://www.hastymail.org/security/
xf hastymail2-cookie-weak-security(64891)
Last major update 17-08-2017 - 01:31
Published 18-01-2011 - 18:03
Last modified 17-08-2017 - 01:31
Back to Top