5
CVSSv2

CVE-2008-3663

Published: 24/09/2008 Updated: 11/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote malicious users to capture this cookie.

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail squirrelmail 1.4.15

Vendor Advisories

Synopsis Moderate: squirrelmail security update Type/Severity Security Advisory: Moderate Topic An updated squirrelmail package that resolves various security issues isnow available for Red Hat Enterprise Linux 3, 4 and 5This update has been rated as having moderate security impact by the RedHat Security R ...
Debian Bug report logs - #499942 CVE-2008-3663: Squirrelmail: Session hijacking vulnerability Package: squirrelmail; Maintainer for squirrelmail is Jeroen van Wolffelaar <jeroen@wolffelaarnl>; Source for squirrelmail is src:squirrelmail (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Tue, 23 ...