First published: Tue Nov 26 2019(Updated: )
A CSRF issue was found in JBoss Application Server 7 before 7.1.0. JBoss did not properly restrict access to the management console information (for example via the "Access-Control-Allow-Origin" HTTP access control flag). This can lead to unauthorized information leak if a user with admin privileges visits a specially-crafted web page provided by a remote attacker.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Application Server | =7.0.0 | |
Redhat Jboss Application Server | =7.0.1 | |
Redhat Jboss Application Server | =7.0.2 | |
Redhat Jboss Application Server | =7.0.0-alpha1 | |
Redhat Jboss Application Server | =7.0.0-beta1 | |
Redhat Jboss Application Server | =7.0.0-beta2 | |
Redhat Jboss Application Server | =7.0.0-beta3 | |
Redhat Jboss Application Server | =7.0.0-cr1 | |
debian/jbossas4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3609 is a CSRF vulnerability in JBoss Application Server 7 before version 7.1.0.
CVE-2011-3609 allows unauthorized information leak and can lead to an unauthorized user with admin privileges.
JBoss Application Server versions 7.0.0, 7.0.1, and 7.0.2 are affected by CVE-2011-3609.
The severity of CVE-2011-3609 is medium with a severity value of 6.5.
No specific fixes are mentioned for CVE-2011-3609, please refer to the references for more information.