FreeBSD : mantis -- session hijacking vulnerability (00d6040a-b8e0-11dd-a578-0030843d3802)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The mantis Team reports :

When configuring a web application to use only ssl (e. g. by
forwarding all http-requests to https), a user would expect that
sniffing and hijacking the session is impossible. Though, for this to
be secure, one needs to set the session cookie to have the secure
flag. Else the cookie will be transferred through http if the victim's
browser does a single http-request on the same domain.

See also :

http://www.mantisbt.org/bugs/view.php?id=9524
http://www.mantisbt.org/bugs/view.php?id=9533
http://www.nessus.org/u?0b39cd6e
http://int21.de/cve/CVE-2008-3102-mantis.html
http://www.nessus.org/u?5e0d26d6

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 34939 (freebsd_pkg_00d6040ab8e011dda5780030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2008-3102

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now