Rapid7 Vulnerability & Exploit Database

Joomla!: [20090101] - Core - JSession SSL Session Disclosure

Back to Search

Joomla!: [20090101] - Core - JSession SSL Session Disclosure

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
02/13/2014
Created
07/25/2018
Added
02/20/2014
Modified
04/20/2016

Description

When running a site under SSL ONLY (the entire site is forced to be under ssl), Joomla! does not set the SSL flag on the cookie.  This can allow someone monitoring the network to find the cookie related to the session.  Please note that all data is still transferred securely.

Solution(s)

  • joomla-upgrade-1_5_9

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;