Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
References
Link | Resource |
---|---|
https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 | Patch Third Party Advisory |
https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/ | Permissions Required Third Party Advisory |
Configurations
Information
Published : 2022-06-29 04:15
Updated : 2022-07-07 12:52
NVD link : CVE-2021-40642
Mitre link : CVE-2021-40642
JSON object : View
CWE
CWE-565
Reliance on Cookies without Validation and Integrity Checking
Products Affected
textpattern
- textpattern