CVE-2025-36011: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.24 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI Analysis
Technical Summary
CVE-2025-36011 is a medium-severity vulnerability affecting IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.24. The issue arises because the application does not set the 'Secure' attribute on authorization tokens or session cookies. The 'Secure' attribute is a flag that instructs browsers to only send cookies over HTTPS connections, preventing them from being transmitted over unencrypted HTTP links. Without this attribute, cookies containing sensitive session or authorization information can be sent over insecure HTTP connections if a user follows an HTTP link or visits a site that forces HTTP requests. An attacker can exploit this by tricking users into clicking on crafted HTTP links or by embedding such links in websites the user visits. When the browser sends the cookie over HTTP, the attacker can intercept the cookie value by network traffic sniffing, potentially leading to session hijacking or unauthorized access. This vulnerability is classified under CWE-614, which concerns sensitive cookies being transmitted without the 'Secure' attribute, exposing them to interception. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking a malicious link). The impact is limited to confidentiality loss of session cookies, with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability poses a risk to the confidentiality of user sessions in environments where IBM Jazz for Service Management is deployed, especially if users can be socially engineered to click on malicious HTTP links.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability could lead to unauthorized access to service management sessions if attackers successfully intercept session cookies. This could compromise sensitive operational data, disrupt service management workflows, or allow attackers to impersonate legitimate users. Given that IBM Jazz for Service Management is often used in IT service and asset management, unauthorized access could expose internal processes and sensitive information. The confidentiality breach could also lead to compliance issues under GDPR, as unauthorized access to personal or operational data may constitute a data breach. The risk is heightened in environments where users frequently access the service over mixed HTTP/HTTPS environments or where users can be tricked into clicking HTTP links. However, the lack of known exploits and the medium severity score suggest the threat is moderate but should not be ignored. Organizations with remote or mobile users who might access the service from less secure networks are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately review and update IBM Jazz for Service Management to the latest version once IBM releases a patch that sets the 'Secure' attribute on cookies. 2) Enforce strict HTTPS usage by configuring web servers and application gateways to redirect all HTTP traffic to HTTPS, preventing cookies from being sent over insecure channels. 3) Implement HTTP Strict Transport Security (HSTS) headers to ensure browsers only connect via HTTPS. 4) Educate users about the risks of clicking on untrusted HTTP links and encourage vigilance against phishing attempts. 5) Monitor network traffic for unusual HTTP requests that might indicate attempts to exploit this vulnerability. 6) Consider deploying web application firewalls (WAFs) that can detect and block suspicious HTTP traffic targeting the service. 7) Review session management policies to limit session duration and implement additional authentication factors to reduce the impact of stolen cookies. These steps go beyond generic advice by focusing on enforcing HTTPS usage and user awareness to prevent cookie leakage.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-36011: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in IBM Jazz for Service Management
Description
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.24 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
AI-Powered Analysis
Technical Analysis
CVE-2025-36011 is a medium-severity vulnerability affecting IBM Jazz for Service Management versions 1.1.3.0 through 1.1.3.24. The issue arises because the application does not set the 'Secure' attribute on authorization tokens or session cookies. The 'Secure' attribute is a flag that instructs browsers to only send cookies over HTTPS connections, preventing them from being transmitted over unencrypted HTTP links. Without this attribute, cookies containing sensitive session or authorization information can be sent over insecure HTTP connections if a user follows an HTTP link or visits a site that forces HTTP requests. An attacker can exploit this by tricking users into clicking on crafted HTTP links or by embedding such links in websites the user visits. When the browser sends the cookie over HTTP, the attacker can intercept the cookie value by network traffic sniffing, potentially leading to session hijacking or unauthorized access. This vulnerability is classified under CWE-614, which concerns sensitive cookies being transmitted without the 'Secure' attribute, exposing them to interception. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking a malicious link). The impact is limited to confidentiality loss of session cookies, with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability poses a risk to the confidentiality of user sessions in environments where IBM Jazz for Service Management is deployed, especially if users can be socially engineered to click on malicious HTTP links.
Potential Impact
For European organizations using IBM Jazz for Service Management, this vulnerability could lead to unauthorized access to service management sessions if attackers successfully intercept session cookies. This could compromise sensitive operational data, disrupt service management workflows, or allow attackers to impersonate legitimate users. Given that IBM Jazz for Service Management is often used in IT service and asset management, unauthorized access could expose internal processes and sensitive information. The confidentiality breach could also lead to compliance issues under GDPR, as unauthorized access to personal or operational data may constitute a data breach. The risk is heightened in environments where users frequently access the service over mixed HTTP/HTTPS environments or where users can be tricked into clicking HTTP links. However, the lack of known exploits and the medium severity score suggest the threat is moderate but should not be ignored. Organizations with remote or mobile users who might access the service from less secure networks are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately review and update IBM Jazz for Service Management to the latest version once IBM releases a patch that sets the 'Secure' attribute on cookies. 2) Enforce strict HTTPS usage by configuring web servers and application gateways to redirect all HTTP traffic to HTTPS, preventing cookies from being sent over insecure channels. 3) Implement HTTP Strict Transport Security (HSTS) headers to ensure browsers only connect via HTTPS. 4) Educate users about the risks of clicking on untrusted HTTP links and encourage vigilance against phishing attempts. 5) Monitor network traffic for unusual HTTP requests that might indicate attempts to exploit this vulnerability. 6) Consider deploying web application firewalls (WAFs) that can detect and block suspicious HTTP traffic targeting the service. 7) Review session management policies to limit session duration and implement additional authentication factors to reduce the impact of stolen cookies. These steps go beyond generic advice by focusing on enforcing HTTPS usage and user awareness to prevent cookie leakage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:07.862Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c082c41d20e9585176cde3
Added to database: 9/9/2025, 7:40:52 PM
Last enriched: 9/17/2025, 1:04:55 AM
Last updated: 10/29/2025, 11:22:50 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownCVE-2025-10931: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal Umami Analytics
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.