First published: Tue Nov 18 2008(Updated: )
Cross-site request forgery (CSRF) vulnerability in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to hijack the authentication of administrators for requests that update the password via idm/admin/changeself.jsp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Identity Manager | =6.0-sp2 | |
Sun Java System Identity Manager | =7.0 | |
Sun Java System Identity Manager | =6.0-sp1 | |
Sun Java System Identity Manager | =7.1 | |
Sun Java System Identity Manager | =6.0-sp3 | |
Sun Java System Identity Manager | =6.0-sp4 | |
Sun Java System Identity Manager | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5115 is considered a high severity vulnerability due to its potential for cross-site request forgery against administrative functions.
To fix CVE-2008-5115, ensure that you apply the latest security patches released for Sun Java System Identity Manager.
CVE-2008-5115 affects users of Sun Java System Identity Manager versions 6.0 up to SP4, 7.0, and 7.1.
CVE-2008-5115 permits remote attackers to hijack the authentication of administrators through cross-site request forgery.
CVE-2008-5115 specifically involves the 'idm/admin/changeself.jsp' component of Sun Java System Identity Manager.