# 会话Cookie缺失HttpOnly属性
## 概述
ConnectWise PSA 在版本 2026.1 之前,部分会话 Cookie 未设置 HttpOnly 属性。
## 影响版本
版本早于 2026.1 的 ConnectWise PSA。
## 细节
相关会话 Cookie 缺少 HttpOnly 标志,可能导致客户端脚本读取这些 Cookie 的值。
## 影响
在特定条件下,攻击者可通过跨站脚本(XSS)等手段窃取会话 Cookie,实现会话劫持。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: PSA Security Fix | January 15, 2026 -- 🔗来源链接
标签:
神龙速读:
### ConnectWise PSA 2026.1 Security Fix
- **Date:** 1/15/2026
- **Product(s):** ConnectWise PSA
- **Severity:** Important
- **Priority:** 2 - Moderate
#### Summary
In ConnectWise PSA versions prior to 2026.1, one condition in Time Entry note handling could permit stored script execution in both the PSA web client and PSA Desktop, and a separate condition could allow client-side access to certain session cookies. The PSA 2026.1 release updates input handling and session cookie configuration to address these issues, and we recommend upgrading to the latest available version.
#### Vulnerability
- **CVE-2026-0695**
- **CWE ID:** CWE-79
- **Description:** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- **Base Score:** 8.7
- **Vector:** CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
- **CVE-2026-0696**
- **CWE ID:** CWE-668
- **Description:** Exposure of Resource to Wrong Sphere ('Resource Injection')
- **Base Score:** 4.7
- **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
#### Recommended Severity
- 2 - Moderate: Vulnerabilities that are either being targeted or have higher risk of being targeted by exploits in the wild. Recommend installing updates as emergency changes or as soon as possible (e.g. within days).
#### Affected Versions
- All versions prior to 2026.1
#### Remediation
- **Cloud**
- Cloud instances are automatically being updated to the latest ConnectWise PSA release.
- **On-premise**
- Apply the 2026.1 release patches and ensure all desktop clients are up to date.
暂无评论