CVE-2012-4529
Published Oct 28, 2013
Last updated 11 years ago
Overview
- Description
- The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E56D6F43-7E18-4979-A68F-56B881EE9B70", "versionEndIncluding": "7.1.1" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5487FC1A-8A76-4719-B5DE-80B662902C69" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5BF0A1-E061-48B6-A7B3-61AE5F800FA4" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66201A00-DE78-427F-9D11-22FCE85972DF" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDA3CBD4-EB52-4140-AEBA-33B8E4219F00" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBF501A2-546D-4090-B237-F00A6A2F677F" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "929FDE1E-18FF-4806-A568-96927846CF17" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D91749FE-C609-4DB9-A114-C7897FC3C2C9" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F962612-A75E-4813-B02F-279326F99FEF" }, { "criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB021539-4AEF-4A23-AC2A-AFA47B3E68A1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D" } ], "operator": "OR" } ] } ]