The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not properly handle CSRF tokens generated during an active session and includes them in query strings, which makes easier for remote malicious users to (1) bypass CSRF protection mechanisms or (2) conduct cross-site request forgery (CSRF) attacks by obtaining an old token.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat jboss bpm suite 6.3.2 |