Vulnerability Details : CVE-2015-3155
Foreman before 1.8.1 does not set the secure flag for the _session_id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Vulnerability category: BypassGain privilege
Products affected by CVE-2015-3155
- cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3155
0.63%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3155
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-3155
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3155
-
https://access.redhat.com/errata/RHSA-2015:1591
RHSA-2015:1591 - Security Advisory - Red Hat Customer Portal
-
https://github.com/theforeman/foreman/pull/2328
Fixes #10275 -Use secure cookies when SSL by shlomizadok · Pull Request #2328 · theforeman/foreman · GitHubPatch
-
https://groups.google.com/forum/#%21topic/foreman-announce/QPtN0h04jdo
Sign in - Google Accounts
-
https://bugzilla.redhat.com/show_bug.cgi?id=1216035
1216035 – (CVE-2015-3155) CVE-2015-3155 foreman: the _session_id cookie is issued without the Secure flag
-
http://projects.theforeman.org/issues/10275
Bug #10275: CVE-2015-3155 - The _session_id cookie is issued without the Secure flag - ForemanVendor Advisory
-
https://access.redhat.com/errata/RHSA-2015:1592
RHSA-2015:1592 - Security Advisory - Red Hat Customer Portal
Jump to