Vulnerability Details : CVE-2022-3250
Potential exploit
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.6.
Products affected by CVE-2022-3250
- cpe:2.3:a:ikus-soft:rdiffweb:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-3250
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-3250
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
1.5
|
3.4
|
huntr.dev | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2022-3250
-
The product does not encrypt sensitive or critical information before storage or transmission.Assigned by: nvd@nist.gov (Primary)
-
The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session.Assigned by: security@huntr.dev (Secondary)
References for CVE-2022-3250
-
https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23
Secure token is missed when ivalid URL is entered vulnerability found in rdiffwebExploit;Patch;Third Party Advisory
-
https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee
Use 'Secure' Attribute with Sensitive Cookie in HTTPS Session on HTTP… · ikus060/rdiffweb@ac334dd · GitHubPatch;Third Party Advisory
Jump to