First published: Wed Jun 23 2010(Updated: )
It was reported that Luci's (Luci is a web based front-end component of the Conga cluster management system) user session timeout feature depended only on JavaScript script running in the user's browser. If user closed browser tab without logging out of Luci session and without closing browser, they could re-open Luci web interface and continue using the session even after the timeout period has elapsed. References: <a href="http://sourceware.org/cluster/conga/">http://sourceware.org/cluster/conga/</a> Acknowledgement: Red Hat would like to thank George Hedfors of Cybercom Sweden East AB for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Conga | ||
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3359 is rated as a moderate severity vulnerability.
To fix CVE-2012-3359, update your Red Hat Conga installation to the latest version provided by Red Hat.
CVE-2012-3359 affects Red Hat Conga and Red Hat Enterprise Linux 5 systems.
CVE-2012-3359 is a session management vulnerability related to user session timeouts.
CVE-2012-3359 could allow unauthorized access to user sessions if the user closes the browser tab without logging out.