First published: Tue Apr 23 2013(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in IBM TRIRIGA Application Platform 2.x and 3.x before 3.3, and 8, allow remote attackers to hijack the authentication of arbitrary users for requests that modify data records via vectors involving (1) the html/en/default/ directory or (2) sqa/html/en/default/process/comm/saveProps.jsp.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM TRIRIGA Application Platform | =2.1 | |
IBM TRIRIGA Application Platform | =2.5 | |
IBM TRIRIGA Application Platform | =2.6 | |
IBM TRIRIGA Application Platform | =2.7 | |
IBM TRIRIGA Application Platform | =3.0 | |
IBM TRIRIGA Application Platform | =3.1 | |
IBM TRIRIGA Application Platform | =3.2 | |
IBM TRIRIGA Application Platform | =3.2.1 | |
IBM TRIRIGA Application Platform | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5950 is identified with a medium severity level due to its potential to allow unauthorized actions on the IBM TRIRIGA Application Platform.
To mitigate CVE-2012-5950, upgrade the IBM TRIRIGA Application Platform to version 3.3 or later.
CVE-2012-5950 affects multiple versions of the IBM TRIRIGA Application Platform, specifically versions 2.x and 3.x prior to 3.3 and version 8.0.
CVE-2012-5950 allows attackers to perform cross-site request forgery (CSRF) attacks, potentially hijacking user sessions.
Organizations using vulnerable versions of the IBM TRIRIGA Application Platform may be at risk of unauthorized data modifications due to CVE-2012-5950.