First published: Fri Oct 19 2012(Updated: )
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Community Application Server | <=7.1.1 | |
Red Hat JBoss Community Application Server | =5.0.0 | |
Red Hat JBoss Community Application Server | =5.0.1 | |
Red Hat JBoss Community Application Server | =5.1.0 | |
Red Hat JBoss Community Application Server | =6.0.0 | |
Red Hat JBoss Community Application Server | =6.1.0 | |
Red Hat JBoss Community Application Server | =7.0.0 | |
Red Hat JBoss Community Application Server | =7.0.1 | |
Red Hat JBoss Community Application Server | =7.0.2 | |
Red Hat JBoss Community Application Server | =7.1.0 | |
JBoss Enterprise Application Platform | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4529 has a medium severity rating, indicating potential risk for session hijacking.
To mitigate CVE-2012-4529, upgrade your Red Hat JBoss Web server to a version later than 7.1.1.
CVE-2012-4529 affects Red Hat JBoss Web versions 5.0.0 to 7.1.x, including specific minor versions.
The impact of CVE-2012-4529 allows attackers to potentially hijack user sessions through man-in-the-middle attacks.
Yes, CVE-2012-4529 is exploitable remotely, making it critical for users of the affected software to address this vulnerability.