Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 238571 (CVE-2008-3661)

Summary: <www-apps/drupal-{5.22, 6.16} Insecure cookie session hijacking (CVE-2008-3661)
Product: Gentoo Security Reporter: Robert Buchholz (RETIRED) <rbu>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: web-apps
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://int21.de/cve/CVE-2008-3661-drupal.html
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description Robert Buchholz (RETIRED) gentoo-dev 2008-09-24 15:20:54 UTC
CVE-2008-3661 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3661):
  Drupal, probably 5.10 and 6.4, does not set the secure flag for the
  session cookie in an https session, which can cause the cookie to be
  sent in http requests and make it easier for remote attackers to
  capture this cookie.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2008-10-04 17:30:00 UTC
It looks like upstream is not inclined to fix this problem:
http://drupal.org/node/315703

Qoute:
"we consider that this is a configuration problem. It's your responsibility to set session.cookie_secure in the SSL virtual host if you want an SSL-only website."
Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-05 13:05:54 UTC
Added a notice + ewarn which is similar to what Fedora did to resolve this issue. Closing noglsa.

Index: postinstall-en.txt
===================================================================
RCS file: /var/cvsroot/gentoo-x86/www-apps/drupal/files/postinstall-en.txt,v
retrieving revision 1.3
diff -u -B -r1.3 postinstall-en.txt
--- postinstall-en.txt	6 Dec 2007 14:40:54 -0000	1.3
+++ postinstall-en.txt	5 Mar 2010 13:01:29 -0000
@@ -13,4 +13,13 @@
 
 and provide the credential required for the database access.
 
+SECURITY NOTICE: If you use SSL on your Drupal installation, you
+should enable the PHP configuration option `session.cookie-secure'
+to make it harder for attackers to sniff session cookies.
+
+References:
+CVE-2008-3661
+http://www.php.net/manual/en/session.configuration.php#ini.session.cookie-secure
+http://drupal.org/node/315703
+