Date: Mon, 12 Nov 2001 15:59:54 -0600 (CST) From: Sean Kelly <smkelly@rooster.creighton.edu> To: FreeBSD-gnats-submit@freebsd.org Subject: ports/31938: Broken cookie handling in lynx-ssl-2.8.4.1 Message-ID: <20011112215954.E3F4F62D02@rooster.creighton.edu>
next in thread | raw e-mail | index | archive | help
>Number: 31938 >Category: ports >Synopsis: Broken cookie handling in lynx-ssl-2.8.4.1 >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Nov 12 14:00:02 PST 2001 >Closed-Date: >Last-Modified: >Originator: Sean Kelly >Release: FreeBSD 4.4-STABLE i386 >Organization: >Environment: System: FreeBSD rooster.creighton.edu 4.4-STABLE FreeBSD 4.4-STABLE #6: Mon Sep 24 17:13:26 CDT 2001 root@rooster.creighton.edu:/usr/obj/usr/src/sys/ROOSTER i386 >Description: Attempts to login to various websites (Slashdot, local campus site, etc) which have a login/password form which set a cookie and then redirect you to another page are failing. It appears that the browser is not telling the web server about the cookie after the redirect. >How-To-Repeat: Try to login to a user account at http://slashdot.org or some other site that uses a form to collect username/password, POSTs to a page which sets a cookie, and then redirects you to a new page which requires that the previously set cookie be present. >Fix: None known so far. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011112215954.E3F4F62D02>