Vulnerability Description
TorrentFlux 2.4 allows remote authenticated users to delete or modify other users' cookies via the cid parameter in an editCookies action to profile.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Torrentflux Project | Torrentflux | 2.4 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2014/08/29/5
- http://www.openwall.com/lists/oss-security/2014/09/02/3
- http://www.securitytracker.com/id/1030791
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759573Exploit
- http://www.openwall.com/lists/oss-security/2014/08/29/5
- http://www.openwall.com/lists/oss-security/2014/09/02/3
- http://www.securitytracker.com/id/1030791
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759573Exploit
FAQ
What is CVE-2014-6029?
CVE-2014-6029 is a vulnerability with a CVSS score of 4.9 (MEDIUM). TorrentFlux 2.4 allows remote authenticated users to delete or modify other users' cookies via the cid parameter in an editCookies action to profile.php.
How severe is CVE-2014-6029?
CVE-2014-6029 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6029?
Check the references section above for vendor advisories and patch information. Affected products include: Torrentflux Project Torrentflux.