Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
References
Link | Resource |
---|---|
https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 | Patch Third Party Advisory |
https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/ | Permissions Required Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-06-29T10:25:00
Updated: 2022-06-29T10:25:00
Reserved: 2021-09-07T00:00:00
Link: CVE-2021-40642
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-29T11:15:16.533
Modified: 2023-08-08T14:21:49.707
Link: CVE-2021-40642
JSON object: View
Redhat Information
No data.
CWE