First published: Mon Mar 31 2014(Updated: )
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-3359 for the base64-encoded storage of the user and password in a cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Conga | ||
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7347 is rated as a medium severity vulnerability due to its potential to allow unauthorized access to user sessions.
To fix CVE-2013-7347, update to the latest version of Red Hat Conga that addresses this session timeout enforcement issue.
CVE-2013-7347 can lead to an unauthorized user gaining access to a valid session, putting sensitive information at risk.
CVE-2013-7347 affects Red Hat Conga, as well as Red Hat Enterprise Linux 5 and possibly other versions.
A temporary workaround for CVE-2013-7347 includes manually clearing session cookies to prevent unauthorized access until a patch is applied.