1 results (0.006 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. noVNC anterior a 0.5 no configura la bandera de seguro para una cookie en una sesión https, lo que facilita a atacantes remotos capturar esta cookie mediante la intercepción de su transmisión dentro de una sesión http. It was discovered that noVNC did not properly set the 'secure' flag when issuing cookies. An attacker could use this flaw to intercept cookies via a man-in-the-middle attack. • http://rhn.redhat.com/errata/RHSA-2015-0788.html http://rhn.redhat.com/errata/RHSA-2015-0833.html http://rhn.redhat.com/errata/RHSA-2015-0834.html http://rhn.redhat.com/errata/RHSA-2015-0884.html http://www.openwall.com/lists/oss-security/2015/02/17/1 http://www.openwall.com/lists/oss-security/2015/03/12/13 https://bugzilla.redhat.com/show_bug.cgi?id=1193451 https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd https://access.redhat.com/secur • CWE-310: Cryptographic Issues CWE-319: Cleartext Transmission of Sensitive Information •