GHSA-49H4-G8P5-JGQ6
Vulnerability from github – Published: 2018-10-16 19:49 – Updated: 2021-09-01 14:10
VLAI?
Summary
Moderate severity vulnerability that affects org.apache.juddi:juddi-client
Details
After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.
Severity ?
6.1 (Medium)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 3.1.5"
},
"package": {
"ecosystem": "Maven",
"name": "org.apache.juddi:juddi-client"
},
"ranges": [
{
"events": [
{
"introduced": "3.1.2"
},
{
"fixed": "3.2.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2015-5241"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T20:57:58Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as \u0027Pluto\u0027, \u0027jUDDI Portal\u0027, \u0027UDDI Portal\u0027 or \u0027uddi-console\u0027. User session data, credentials, and auth tokens are cleared before the redirect.",
"id": "GHSA-49h4-g8p5-jgq6",
"modified": "2021-09-01T14:10:51Z",
"published": "2018-10-16T19:49:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5241"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-49h4-g8p5-jgq6"
},
{
"type": "WEB",
"url": "http://juddi.apache.org/security.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Moderate severity vulnerability that affects org.apache.juddi:juddi-client"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…