First published: Wed Jun 16 2010(Updated: )
Cross-site request forgery (CSRF) vulnerability in the JMX Console in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 allows remote attackers to hijack the authentication of administrators for requests that deploy WAR files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =4.3.0-cp06 | |
JBoss Enterprise Application Platform | =4.3.0 | |
JBoss Enterprise Application Platform | =4.3.0-cp01 | |
JBoss Enterprise Application Platform | =4.3.0-cp04 | |
JBoss Enterprise Application Platform | =4.3.0-cp07 | |
JBoss Enterprise Application Platform | =4.3.0-cp03 | |
JBoss Enterprise Application Platform | =4.3.0-cp02 | |
JBoss Enterprise Application Platform | =4.3.0-cp08 | |
JBoss Enterprise Application Platform | =4.3.0-cp05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3878 is classified as a high severity vulnerability due to its potential to allow unauthorized administrator access.
To mitigate CVE-2010-3878, it's recommended to upgrade to Red Hat JBoss Enterprise Application Platform 4.3.0.CP09 or later.
CVE-2010-3878 is a cross-site request forgery (CSRF) vulnerability.
CVE-2010-3878 affects various versions of Red Hat JBoss Enterprise Application Platform 4.3.0, including CP01 to CP08.
Yes, CVE-2010-3878 allows remote attackers to hijack administrator authentication, potentially leading to unauthorized actions.