First published: Fri Oct 16 2015(Updated: )
A vulnerability was discovered in the Red Hat Mobile platform allowing a malicious attacker to utilize service for a reflected download attack. An attacker can craft a URL pointing to a file of their choosing that will, in certain browsers, appear to be downloaded from the Red Hat Mobile platform itself. Such a URL could be used in---for example---a spoof or spear-phishing e-mail to capitalize on user trust. Acknowledgements: Red Hat would like to thank Maciej Grela of Trustwave for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Feedhenry Enterprise Mobile Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.