After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2015-5241 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 5.3 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat JBoss Portal Platform 6 | juddi-client | Not affected |
Red Hat JBoss Operations Network 3 | juddi-client | Not affected |
Red Hat JBoss Fuse 6 | juddi-client | Not affected |
Red Hat JBoss Enterprise SOA Platform 5 | juddi | Will not fix |
Red Hat JBoss EAP 6 | juddi-client | Not affected |
Red Hat JBoss EAP 5 | juddi | Will not fix |