IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 257102.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/257102 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/7001635 | Patch Vendor Advisory |
https://www.ibm.com/support/pages/node/7001641 | Patch Vendor Advisory |
https://www.ibm.com/support/pages/node/7001645 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/257102 | VDB Entry Vendor Advisory |
https://www.ibm.com/support/pages/node/7001635 | Patch Vendor Advisory |
https://www.ibm.com/support/pages/node/7001641 | Patch Vendor Advisory |
https://www.ibm.com/support/pages/node/7001645 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/257102 - VDB Entry, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/7001635 - Patch, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/7001641 - Patch, Vendor Advisory | |
References | () https://www.ibm.com/support/pages/node/7001645 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.7 |
16 Jun 2023, 14:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://exchange.xforce.ibmcloud.com/vulnerabilities/257102 - VDB Entry, Vendor Advisory | |
References | (MISC) https://www.ibm.com/support/pages/node/7001641 - Patch, Vendor Advisory | |
References | (MISC) https://www.ibm.com/support/pages/node/7001635 - Patch, Vendor Advisory | |
References | (MISC) https://www.ibm.com/support/pages/node/7001645 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:* cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* cpe:2.3:a:ibm:txseries_for_multiplatform:8.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:ibm:cics_tx:11.1:*:*:*:standard:*:*:* cpe:2.3:a:ibm:txseries_for_multiplatform:*:*:*:*:*:*:*:* cpe:2.3:a:ibm:cics_tx:11.1:*:*:*:advanced:*:*:* cpe:2.3:a:ibm:cics_tx:10.1:*:*:*:advanced:*:*:* |
08 Jun 2023, 02:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-08 01:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-33847
Mitre link : CVE-2023-33847
CVE.ORG link : CVE-2023-33847
JSON object : View
Products Affected
linux
- linux_kernel
hp
- hp-ux
ibm
- txseries_for_multiplatform
- cics_tx
- aix
CWE