Lucene search

K
cve[email protected]CVE-2012-4529
HistoryOct 28, 2013 - 9:55 p.m.

CVE-2012-4529

2013-10-2821:55:04
web.nvd.nist.gov
26
cve-2012-4529
org.apache.catalina.connector.response.encodeurl
red hat jboss web
session id
remote attackers
man-in-the-middle attack
security vulnerability

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.6%

The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.

Affected configurations

NVD
Node
redhatjboss_community_application_serverRange7.1.1
OR
redhatjboss_community_application_serverMatch5.0.0
OR
redhatjboss_community_application_serverMatch5.0.1
OR
redhatjboss_community_application_serverMatch5.1.0
OR
redhatjboss_community_application_serverMatch6.0.0
OR
redhatjboss_community_application_serverMatch6.1.0
OR
redhatjboss_community_application_serverMatch7.0.0
OR
redhatjboss_community_application_serverMatch7.0.1
OR
redhatjboss_community_application_serverMatch7.0.2
OR
redhatjboss_community_application_serverMatch7.1.0
Node
redhatjboss_enterprise_application_platformMatch6.0.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.6%