Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/499354/100/0/threaded | mailing list vdb entry third party advisory broken link |
http://securityreason.com/securityalert/4794 | third party advisory |
http://www.securityfocus.com/archive/1/499295/100/0/threaded | mailing list vdb entry third party advisory broken link |
http://int21.de/cve/CVE-2008-4122-joomla.html | third party advisory |