First published: Fri Aug 12 2011(Updated: )
Cross-site request forgery (CSRF) vulnerability in the JMX Console (jmx-console) in JBoss Enterprise Portal Platform before 5.2.2, BRMS Platform 5.3.0 before roll up patch1, and SOA Platform 5.3.0 allows remote authenticated users to hijack the authentication of arbitrary users for requests that perform operations on MBeans and possibly execute arbitrary code via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise BRMS Platform | =5.3.0 | |
Red Hat JBoss Portal | <=5.2.1 | |
Red Hat JBoss Portal | =5.0.0 | |
Red Hat JBoss Portal | =5.0.1 | |
Red Hat JBoss Portal | =5.1.0 | |
Red Hat JBoss Portal | =5.1.1 | |
Red Hat JBoss Portal | =5.2.0 | |
Red Hat JBoss Enterprise SOA Platform | =5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2908 is classified as a high severity vulnerability due to its potential for cross-site request forgery (CSRF) attacks.
To address CVE-2011-2908, upgrade affected JBoss platforms to version 5.2.2 or higher for the Enterprise Portal Platform, or version 5.3.0 with the relevant patches for the BRMS and SOA Platforms.
CVE-2011-2908 affects JBoss Enterprise Portal Platform versions up to 5.2.1, JBoss Enterprise BRMS Platform 5.3.0 before roll up patch1, and JBoss Enterprise SOA Platform 5.3.0.
Yes, remote authenticated users can exploit CVE-2011-2908 to hijack the authentication of arbitrary users.
Yes, CVE-2011-2908 is specifically a vulnerability found in various versions of JBoss software.