First published: Fri Sep 28 2012(Updated: )
Session fixation vulnerability in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote attackers to hijack web sessions via a crafted session cookie.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trevor Mckay Cumin | <=0.1.5192-4 | |
Trevor Mckay Cumin | =0.1.3160-1 | |
Trevor Mckay Cumin | =0.1.4369-1 | |
Trevor Mckay Cumin | =0.1.4410-2 | |
Trevor Mckay Cumin | =0.1.4494-1 | |
Trevor Mckay Cumin | =0.1.4794-1 | |
Trevor Mckay Cumin | =0.1.4916-1 | |
Trevor Mckay Cumin | =0.1.5033-1 | |
Trevor Mckay Cumin | =0.1.5037-1 | |
Trevor Mckay Cumin | =0.1.5054-1 | |
Trevor Mckay Cumin | =0.1.5068-1 | |
Trevor Mckay Cumin | =0.1.5092-1 | |
Trevor Mckay Cumin | =0.1.5098-2 | |
Trevor Mckay Cumin | =0.1.5105-1 | |
Trevor Mckay Cumin | =0.1.5137-1 | |
Trevor Mckay Cumin | =0.1.5137-2 | |
Trevor Mckay Cumin | =0.1.5137-3 | |
Trevor Mckay Cumin | =0.1.5137-4 | |
Trevor Mckay Cumin | =0.1.5137-5 | |
Trevor Mckay Cumin | =0.1.5192-1 | |
Redhat Enterprise Mrg | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.