Crowd leaks the value of the HTTP only 'crowd.token_key' cookie on the crowd/console/500.jsp page

XMLWordPrintable

      cert.fr@cassidian.com reported the following vulnerability:
      == Type ==
      Information Disclosure

      == Product ==
      Atlassian Crowd

      == Severity ==
      Medium

      == Description ==
      The crowd.token_key cookie, used as a token to authenticate on all Atlassian applications, is marked as HttpOnly.
      However, the Crowd 500 error page (/crowd/console/500.jsp) displays this cookie?s value, breaking the HttpOnly behavior.

            Assignee:
            ArvindA
            Reporter:
            David Black
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved:

                Estimated:
                Original Estimate - Not Specified
                Not Specified
                Remaining:
                Remaining Estimate - Not Specified
                Not Specified
                Logged:
                Time Spent - 53m
                53m