The Browser in IBM Sterling Connect:Direct 1.4 before 1.4.0.11 and 1.5 through 1.5.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
2013-06-21T14:55:01.080
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.0 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.2 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.3 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.6 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.7 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.4.0.10 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.5.0.0 | Yes |
Application | ibm | sterling_connect_direct_user_interface | 1.5.0.1 | Yes |