First published: Fri Oct 16 2015(Updated: )
A vulnerability was discovered in the Red Hat Mobile platform allowing a malicious attacker to utilize service for a reflected download attack. An attacker can craft a URL pointing to a file of their choosing that will, in certain browsers, appear to be downloaded from the Red Hat Mobile platform itself. Such a URL could be used in---for example---a spoof or spear-phishing e-mail to capitalize on user trust. Acknowledgements: Red Hat would like to thank Maciej Grela of Trustwave for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Mobile Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5248 is classified as a high severity vulnerability due to the potential for reflected download attacks.
To mitigate CVE-2015-5248, it is recommended to update to the latest version of the Red Hat Mobile Application Platform.
CVE-2015-5248 is caused by improper handling of URLs that can allow attackers to craft links for malicious file downloads.
CVE-2015-5248 affects users of the Red Hat Mobile Application Platform, specifically in environments where the service is misconfigured.
CVE-2015-5248 can enable reflected download attacks, allowing attackers to trick users into downloading malicious files.