Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
The product does not encrypt sensitive or critical information before storage or transmission.
Link | Tags |
---|---|
https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 | third party advisory patch |
https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/ | third party advisory permissions required |