Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4g88-pvpj-755p

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

IBM Rational Build Forge 7.1.0 uses the HTTP GET method during redirection from the authentication servlet to a PHP script, which makes it easier for context-dependent attackers to discover session IDs by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.

IBM Rational Build Forge 7.1.0 uses the HTTP GET method during redirection from the authentication servlet to a PHP script, which makes it easier for context-dependent attackers to discover session IDs by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.

EPSS

Процентиль: 48%
0.00253
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
почти 15 лет назад

IBM Rational Build Forge 7.1.0 uses the HTTP GET method during redirection from the authentication servlet to a PHP script, which makes it easier for context-dependent attackers to discover session IDs by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.

EPSS

Процентиль: 48%
0.00253
Низкий

Дефекты

CWE-200