CVE Vulnerabilities

CVE-2018-25060

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute

Published: Dec 30, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability.

Weakness

The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session.

Affected Software

Name Vendor Start Version End Version
Csrf Go-macaron - (including) - (including)
Golang-github-go-macaron-csrf Ubuntu bionic *
Golang-github-go-macaron-csrf Ubuntu esm-apps/bionic *
Golang-github-go-macaron-csrf Ubuntu esm-apps/focal *
Golang-github-go-macaron-csrf Ubuntu esm-apps/jammy *
Golang-github-go-macaron-csrf Ubuntu focal *
Golang-github-go-macaron-csrf Ubuntu jammy *
Golang-github-go-macaron-csrf Ubuntu kinetic *
Golang-github-go-macaron-csrf Ubuntu lunar *
Golang-github-go-macaron-csrf Ubuntu trusty *
Golang-github-go-macaron-csrf Ubuntu xenial *

Potential Mitigations

References