CVE-2015-5241

Related Vulnerabilities: CVE-2015-5241  

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

The MITRE CVE dictionary describes this issue as:

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

Find out more about CVE-2015-5241 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact None

Affected Packages State

Platform Package State
Red Hat JBoss Portal Platform 6 juddi-client Not affected
Red Hat JBoss Operations Network 3 juddi-client Not affected
Red Hat JBoss Fuse 6 juddi-client Not affected
Red Hat JBoss Enterprise SOA Platform 5 juddi Will not fix
Red Hat JBoss EAP 6 juddi-client Not affected
Red Hat JBoss EAP 5 juddi Will not fix

Acknowledgements

Red Hat would like to thank Adam Willard (Foreground Security) for reporting this issue.

External References