Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-5241

Опубликовано: 19 мая 2017
Источник: nvd
CVSS3: 6.1
CVSS2: 5.8
EPSS Низкий

Описание

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:juddi:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:juddi:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:juddi:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:juddi:3.1.5:*:*:*:*:*:*:*

EPSS

Процентиль: 85%
0.02557
Низкий

6.1 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 5.3
redhat
больше 10 лет назад

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

CVSS3: 6.1
github
больше 7 лет назад

Moderate severity vulnerability that affects org.apache.juddi:juddi-client

EPSS

Процентиль: 85%
0.02557
Низкий

6.1 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-601