The Browser in IBM Sterling Connect:Direct 1.4 prior to 1.4.0.11 and 1.5 up to and including 1.5.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm sterling connect direct user interface 1.4.0.0 |
||
ibm sterling connect direct user interface 1.4.0.10 |
||
ibm sterling connect direct user interface 1.4.0.6 |
||
ibm sterling connect direct user interface 1.4.0.7 |
||
ibm sterling connect direct user interface 1.4.0.2 |
||
ibm sterling connect direct user interface 1.4.0.3 |
||
ibm sterling connect direct user interface 1.5.0.0 |
||
ibm sterling connect direct user interface 1.5.0.1 |