Hastymail2 Session Cookie Security Bypass Vulnerability

Summary
The host is running Hastymail2 and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow remote attackers to capture this cookie by intercepting its transmission within an HTTP session. Impact Level: Application
Solution
Upgrade to the Hastymail2 RC 8 or later For updates refer to http://www.hastymail.org/blogs/News/
Insight
The flaw is due to error in handling of session cookie, which fails to set the secure flag for the session cookie in an HTTPS session.
Affected
Hastymail2 version prior to RC 8
References