Vulnerability Details : CVE-2008-7298
The Android browser in Android cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue.
Exploit prediction scoring system (EPSS) score for CVE-2008-7298
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-7298
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:P |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2008-7298
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-7298
-
http://scarybeastsecurity.blogspot.com/2011/02/some-less-obvious-benefits-of-hsts.html
Security: Some less obvious benefits of HSTS
-
http://michael-coates.blogspot.com/2010/01/cookie-forcing-trust-your-cookies-no.html
A Journey in Security: Cookie Forcing - Trust your cookies no more
-
http://code.google.com/p/browsersec/wiki/Part2#Same-origin_policy_for_cookies
Google Code Archive - Long-term storage for Google Code Project Hosting.
-
https://bugzilla.mozilla.org/show_bug.cgi?id=660053
660053 - (CVE-2011-2976) [SECURITY] If a BUGLIST cookie is compromised, it can be used to XSS show_bug.cgi and inject HTML into <head>Patch
-
http://scarybeastsecurity.blogspot.com/2008/11/cookie-forcing.html
Security: Cookie forcing
Products affected by CVE-2008-7298
- cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
- cpe:2.3:a:android:android_browser:*:*:*:*:*:*:*:*