The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. NOTE: this issue was SPLIT from CVE-2015-1848 per ADT2 due to different vulnerability types.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-0990.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html | vendor advisory |
https://bugzilla.redhat.com/attachment.cgi?id=1009855 | |
http://rhn.redhat.com/errata/RHSA-2015-0980.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html | vendor advisory |
http://www.securityfocus.com/bid/74682 | vdb entry |