First published: Tue Sep 06 2016(Updated: )
The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not properly handle CSRF tokens generated during an active session and includes them in query strings, which makes easier for remote attackers to (1) bypass CSRF protection mechanisms or (2) conduct cross-site request forgery (CSRF) attacks by obtaining an old token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat JBoss BPM suite | =6.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7034 is rated as a medium severity vulnerability.
To fix CVE-2016-7034, you should upgrade to Red Hat JBoss BPM Suite 6.3.3 or later releases.
CVE-2016-7034 can allow attackers to bypass CSRF protections and conduct unauthorized actions on behalf of users.
CVE-2016-7034 affects users of Red Hat JBoss BPM Suite version 6.3.2.
Yes, CVE-2016-7034 specifically facilitates cross-site request forgery attacks due to improper CSRF token handling.