First published: Fri Jul 08 2016(Updated: )
The Report Builder and Data Collection Component (DCC) in IBM Jazz Reporting Service (JRS) 5.x before 5.0.2 ifix016 and 6.x before 6.0.1 ifix005 maintain session ID validity after a logout action, which allows remote authenticated users to hijack sessions by leveraging an unattended workstation.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Jazz Reporting Service | =5.0 | |
IBM Jazz Reporting Service | =5.0.1 | |
IBM Jazz Reporting Service | =5.0.2 | |
IBM Jazz Reporting Service | =6.0 | |
IBM Jazz Reporting Service | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0315 is classified as a medium severity vulnerability.
To fix CVE-2016-0315, upgrade to IBM Jazz Reporting Service version 5.0.2 ifix016 or 6.0.1 ifix005 or later.
CVE-2016-0315 allows remote authenticated users to hijack sessions by maintaining session ID validity after logout.
CVE-2016-0315 affects IBM Jazz Reporting Service versions 5.0, 5.0.1, 5.0.2, 6.0, and 6.0.1 before specified ifixes.
Yes, CVE-2016-0315 can be exploited from an unattended workstation by leveraging the session ID.