First published: Tue Jun 24 2014(Updated: )
The component in (1) /luci/homebase and (2) /luci/cluster menu in Red Hat Conga 0.12.2 allows remote authenticated users to bypass intended access restrictions via a crafted URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Conga | =0.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3521 is classified as a moderate vulnerability due to its potential for authenticated users to bypass access controls.
To mitigate CVE-2014-3521, it is recommended to upgrade Red Hat Conga to a patched version that addresses the access restriction vulnerabilities.
CVE-2014-3521 affects users of Red Hat Conga version 0.12.2 who have remote authenticated access.
Attackers exploiting CVE-2014-3521 can access administrative functionalities that should be restricted to privileged users.
Currently, there are no documented workarounds for CVE-2014-3521 other than applying the recommended security patch.