First published: Thu Jan 19 2012(Updated: )
Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 allows remote attackers to hijack agent sessions via an agent registration request without a security token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Operations Network | <=2.4.1 | |
Red Hat JBoss Operations Network | =2.0.0 | |
Red Hat JBoss Operations Network | =2.0.1 | |
Red Hat JBoss Operations Network | =2.1.0 | |
Red Hat JBoss Operations Network | =2.2 | |
Red Hat JBoss Operations Network | =2.3 | |
Red Hat JBoss Operations Network | =2.3.1 | |
Red Hat JBoss Operations Network | =2.4 | |
Red Hat JBoss Operations Network | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0062 has a moderate severity rating due to the potential for remote session hijacking.
To fix CVE-2012-0062, upgrade Red Hat JBoss Operations Network to version 2.4.2 or higher, or 3.0.1 or higher.
CVE-2012-0062 affects Red Hat JBoss Operations Network versions 2.0.0 to 2.4.1 and 3.0.0.
Organizations using vulnerable versions of Red Hat JBoss Operations Network are impacted by CVE-2012-0062.
Yes, CVE-2012-0062 can be exploited remotely by attackers without a security token.