The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
2015-05-14T14:59:07.897
2025-04-12T10:46:40.837
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fedora | pacemaker_configuration_system | ≤ 0.9.137 | Yes |
Operating System | redhat | enterprise_linux_high_availability | 6.0 | Yes |
Operating System | redhat | enterprise_linux_high_availability | 7.0 | Yes |
Operating System | redhat | enterprise_linux_high_availability_eus | 6.6.z | Yes |
Operating System | redhat | enterprise_linux_high_availability_eus | 7.1 | Yes |
Operating System | redhat | enterprise_linux_resilient_storage | 6.0 | Yes |
Operating System | redhat | enterprise_linux_resilient_storage | 7.0 | Yes |
Operating System | redhat | enterprise_linux_resilient_storage_eus | 6.6.z | Yes |
Operating System | redhat | enterprise_linux_resilient_storage_eus | 7.1 | Yes |