CVE-2010-3902

OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:infradead:openconnect:*:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.00:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.10:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.20:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:1.30:*:*:*:*:*:*:*
cpe:2.3:a:infradead:openconnect:2.22:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-10-14 05:58

Updated : 2024-02-04 17:54


NVD link : CVE-2010-3902

Mitre link : CVE-2010-3902

CVE.ORG link : CVE-2010-3902


JSON object : View

Products Affected

infradead

  • openconnect
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor