Vulnerability Description
IBM WebSphere Application Server (WAS) 8.5 through 8.5.5.9 Liberty before Liberty Fix Pack 16.0.0.2 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified JAX-RS API cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Websphere Application Server | 8.5.5.0 |
Related Weaknesses (CWE)
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1PI61936
- http://www-01.ibm.com/support/docview.wss?uid=swg21983700Vendor Advisory
- http://www.securityfocus.com/bid/91518
- http://www-01.ibm.com/support/docview.wss?uid=swg1PI61936
- http://www-01.ibm.com/support/docview.wss?uid=swg21983700Vendor Advisory
- http://www.securityfocus.com/bid/91518
FAQ
What is CVE-2016-2923?
CVE-2016-2923 is a vulnerability with a CVSS score of 7.5 (HIGH). IBM WebSphere Application Server (WAS) 8.5 through 8.5.5.9 Liberty before Liberty Fix Pack 16.0.0.2 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified JAX-RS API cookie, whic...
How severe is CVE-2016-2923?
CVE-2016-2923 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2923?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Websphere Application Server.