login.aspx in the SmarterTools SmarterStats 6.0 web server does not include the HTTPOnly flag in a Set-Cookie header for the loginsettings cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html | |
http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html | |
http://www.kb.cert.org/vuls/id/MORO-8GYQR4 | us government resource |
http://www.kb.cert.org/vuls/id/240150 | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67828 | vdb entry |