CVE-2025-36249
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-05

Assigner: IBM Corporation

Description
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-05
Generated
2026-05-06
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ibm jazz_for_service_management From 1.1.3.0 (inc) to 1.1.3.26 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-614 The Secure attribute for sensitive cookies in HTTPS sessions is not set.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25 occurs because the application does not set the 'secure' attribute on authorization tokens or session cookies, such as the 'filter' cookie. Without this attribute, cookies can be sent over insecure HTTP connections if a user clicks on a crafted HTTP link or visits a malicious site containing such a link. Attackers can intercept these cookies by snooping on unencrypted network traffic, potentially compromising session integrity. [1]


How can this vulnerability impact me? :

The vulnerability allows attackers to obtain session cookies by intercepting them over insecure HTTP connections. This can lead to attackers compromising session integrity, potentially allowing unauthorized access to user sessions or sensitive information tied to those sessions. However, the impact is considered low in terms of confidentiality, with no impact on integrity or availability. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting the cookies set by IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25 to check if the 'secure' attribute is missing on authorization tokens or session cookies, specifically the 'filter' cookie. On the network, you can capture HTTP traffic to see if session cookies are transmitted over unencrypted HTTP connections. Commands such as 'curl -I http://your-jazz-server' to inspect cookie headers or using network packet capture tools like 'tcpdump' or 'Wireshark' to monitor HTTP traffic for cookie transmission can help detect this issue. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade IBM Jazz for Service Management to version 1.1.3.26, specifically applying patch 1.1.3-TIV-JazzSM-multi-FP026, which addresses the issue by setting the 'secure' attribute on authorization tokens and session cookies. No other workarounds or mitigations are provided. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart