CVE-2025-36249
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-05
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | jazz_for_service_management | From 1.1.3.0 (inc) to 1.1.3.26 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-614 | The Secure attribute for sensitive cookies in HTTPS sessions is not set. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25 occurs because the application does not set the 'secure' attribute on authorization tokens or session cookies, such as the 'filter' cookie. Without this attribute, cookies can be sent over insecure HTTP connections if a user clicks on a crafted HTTP link or visits a malicious site containing such a link. Attackers can intercept these cookies by snooping on unencrypted network traffic, potentially compromising session integrity. [1]
How can this vulnerability impact me? :
The vulnerability allows attackers to obtain session cookies by intercepting them over insecure HTTP connections. This can lead to attackers compromising session integrity, potentially allowing unauthorized access to user sessions or sensitive information tied to those sessions. However, the impact is considered low in terms of confidentiality, with no impact on integrity or availability. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by inspecting the cookies set by IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.25 to check if the 'secure' attribute is missing on authorization tokens or session cookies, specifically the 'filter' cookie. On the network, you can capture HTTP traffic to see if session cookies are transmitted over unencrypted HTTP connections. Commands such as 'curl -I http://your-jazz-server' to inspect cookie headers or using network packet capture tools like 'tcpdump' or 'Wireshark' to monitor HTTP traffic for cookie transmission can help detect this issue. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade IBM Jazz for Service Management to version 1.1.3.26, specifically applying patch 1.1.3-TIV-JazzSM-multi-FP026, which addresses the issue by setting the 'secure' attribute on authorization tokens and session cookies. No other workarounds or mitigations are provided. [1]