Jenkins before 1.586 does not set the secure flag on session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to capture cookies by intercepting their transmission within an HTTP session.
References
Link | Resource |
---|---|
https://jenkins.io/changelog-old/ | Release Notes Vendor Advisory |
https://issues.jenkins-ci.org/browse/JENKINS-25019 | Issue Tracking Vendor Advisory |
https://github.com/jenkinsci/jenkins/commit/582128b9ac179a788d43c1478be8a5224dc19710 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1185148 | Issue Tracking Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769682 | Third Party Advisory |
http://www.securityfocus.com/bid/72054 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/01/22/3 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-09-12 07:29
Updated : 2017-09-21 11:47
NVD link : CVE-2014-9634
Mitre link : CVE-2014-9634
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
apache
- tomcat
jenkins
- jenkins