CVE-2021-40642

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-40642
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-40642.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-40642
Published
2022-06-29T11:15:16Z
Modified
2025-01-08T11:09:22.242132Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplibmisc.php. The secure flag is not set for txplogin session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.

References

Affected packages

Git / github.com/textpattern/textpattern

Affected ranges

Type
GIT
Repo
https://github.com/textpattern/textpattern
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

4.*

4.2.0
4.3.0
4.4.0
4.4.1
4.5.0
4.5.1
4.5.2
4.6.0
4.6.0-beta
4.6.0-beta.2
4.6.0-beta.3
4.6.1
4.6.2
4.7.0
4.7.0-beta
4.7.0-beta.2
4.7.0-beta.3
4.7.0-rc.1
4.7.1
4.7.2
4.7.3
4.8.0
4.8.0-beta
4.8.0-beta.2
4.8.0-beta.3
4.8.1
4.8.2
4.8.3
4.8.4
4.8.5
4.8.6
4.8.7