Web Application Session Manipulation Vulnerability in Apache jUDDI
CVE-2015-5241

6.1MEDIUM

Key Information:

Vendor
Apache
Vendor
CVE Published:
19 May 2017

Summary

The Apache jUDDI web application exposes a critical weakness in its session management handling. When a user logs out, the application erroneously redirects them back to the login page without ensuring prior security checks. This flaw can be exploited by malicious users to redirect users' browsers to potential phishing sites. Furthermore, user session data, including credentials and authentication tokens, are cleared before any redirection occurs, making it possible for attackers to target users during the logout process. This issue is present in specific versions of jUDDI, raising concerns over the security of user sessions.

Affected Version(s)

Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.