First published: Fri Oct 19 2012(Updated: )
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Community Application Server | <=7.1.1 | |
Redhat Jboss Community Application Server | =5.0.0 | |
Redhat Jboss Community Application Server | =5.0.1 | |
Redhat Jboss Community Application Server | =5.1.0 | |
Redhat Jboss Community Application Server | =6.0.0 | |
Redhat Jboss Community Application Server | =6.1.0 | |
Redhat Jboss Community Application Server | =7.0.0 | |
Redhat Jboss Community Application Server | =7.0.1 | |
Redhat Jboss Community Application Server | =7.0.2 | |
Redhat Jboss Community Application Server | =7.1.0 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.