The session cookie in MailGates and MailAudit from Openfind does not have the HttpOnly flag enabled, allowing remote attackers to potentially steal the session cookie via XSS.
Solution:
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-7927-03837-1.html | third party advisory |
https://www.twcert.org.tw/en/cp-139-7928-04e8a-2.html | third party advisory |
https://www.openfind.com.tw/taiwan/download/Openfind_OF-ISAC-24-007.pdf | vendor advisory exploit |