First published: Wed Aug 12 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=6.4.3 | |
Red Hat JBoss WildFly Application Server | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5188 is considered a medium severity vulnerability due to its potential to allow remote attackers to hijack administrative authentication.
To fix CVE-2015-5188, upgrade Red Hat Enterprise Application Platform to version 6.4.4 or later, and WildFly to version 2.0.0.CR9 or later.
Users of Red Hat Enterprise Application Platform versions up to and including 6.4.3 and WildFly versions up to and including 2.0.0 are affected by CVE-2015-5188.
CVE-2015-5188 is classified as a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2015-5188 can lead to unauthorized access by allowing attackers to hijack an administrator's authentication session.