FreeBSD : squirrelmail -- Session hijacking vulnerability (a0afb4b9-89a1-11dd-a65b-00163e000016)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Hanno Boeck reports :

When configuring a web application to use only ssl (e.g. by forwarding
all http-requests to https), a user would expect that sniffing and
hijacking the session is impossible.

Though, for this to be secure, one needs to set the session cookie to
have the secure flag. Otherwise the cookie will be transferred through
HTTP if the victim's browser does a single HTTP request on the same
domain.

Squirrelmail does not set that flag. It is fixed in the 1.5 test
versions, but current 1.4.15 is vulnerable.

See also :

http://seclists.org/bugtraq/2008/Sep/0239.html
http://www.nessus.org/u?e57c8f93

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 34271 (freebsd_pkg_a0afb4b989a111dda65b00163e000016.nasl)

Bugtraq ID: 31321

CVE ID: CVE-2008-3663

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now