Executive Summary
Summary | |
---|---|
Title | Web sites may transmit authentication tokens unencrypted |
Informations | |||
---|---|---|---|
Name | VU#466433 | First vendor Publication | 2007-09-07 |
Vendor | VU-CERT | Last vendor Modification | 2007-10-03 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#466433Web sites may transmit authentication tokens unencryptedOverviewWeb services that rely on cookies for authentication may be vulnerable to an authentication bypass vulnerability.Some web sites transmit authentication material (often cookies) without encrypting the entire session, even when the authentication material is initially set over an encrypted HTTP session. This behavior could allow an attacker on the network path to obtain authentication material and impersonate a legitimate user. Sites that set authentication cookies over https during login and then later transmit the cookies over HTTP are particularly vulnerable, since users are more likely to think that the security of the login page applies to the entire session. Workarounds for users
Systems Affected
Referenceshttp://www.kb.cert.org/vuls/id/546483 Information about this vulnerability was released by Erratasec. This document was written by Ryan Giobbi and Dean Reges.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/466433 |