First published: Thu Aug 23 2012(Updated: )
Cross-site request forgery (CSRF) vulnerability in the GateIn Portal component in JBoss Enterprise Portal Platform 5.2.2 and earlier allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Portal | <=5.2.2 | |
Red Hat JBoss Portal | =4.3.0 | |
Red Hat JBoss Portal | =5.0.0 | |
Red Hat JBoss Portal | =5.0.1 | |
Red Hat JBoss Portal | =5.1.0 | |
Red Hat JBoss Portal | =5.1.1 | |
Red Hat JBoss Portal | =5.2.0 | |
Red Hat JBoss Portal | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3532 is categorized as a medium severity vulnerability due to its impact on user authentication.
To fix CVE-2012-3532, upgrade to a patched version of JBoss Enterprise Portal Platform, specifically version 5.2.3 or later.
CVE-2012-3532 can enable attackers to perform cross-site request forgery (CSRF) attacks, potentially hijacking user sessions.
CVE-2012-3532 affects JBoss Enterprise Portal Platform versions 5.2.2 and earlier, as well as specific earlier versions like 4.3.0 and various 5.x versions.
Yes, user data may be at risk since attackers can hijack authenticated sessions and potentially access sensitive information.