The Ubercart AJAX Cart 6.x-2.x before 6.x-2.1 for Drupal stores the PHP session id in the JavaScript settings array in page loads, which might allow remote attackers to obtain sensitive information by sniffing or reading the cache of the HTML of a webpage.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://drupalcode.org/project/uc_ajax_cart.git/commitdiff/b59cdd5 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/76332 | vdb entry |
http://www.securityfocus.com/bid/53999 | vdb entry |
http://drupal.org/node/1633048 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2012/06/14/3 | mailing list |
http://drupal.org/node/1619586 | patch |