Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4431

Опубликовано: 04 дек. 2012
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.

Отчет

This issue did not affect the versions of tomcat5 as shipped with Red Hat Enterprise Linux 5 and tomcat6 as shipped with Red Hat Enterprise Linux 6 as they did not include the CSRF prevention filter.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat JBoss BRMS 5jbosswebNot affected
Red Hat JBoss Data Grid 6jbosswebAffected
Red Hat JBoss Enterprise Web Server 1eap5Not affected
Red Hat JBoss Enterprise Web Server 1eap6Affected
Red Hat JBoss Enterprise Web Server 1ewp5Not affected
Red Hat JBoss Operations Network 3.1jbosswebNot affected
Red Hat JBoss Portal 5jbosswebNot affected
Red Hat JBoss Portal 6jbosswebAffected
Red Hat JBoss SOA Platform 5jbosswebNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=883636Tomcat/JBoss Web - Bypass of CSRF prevention filter

EPSS

Процентиль: 95%
0.16411
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.

nvd
больше 12 лет назад

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.

debian
больше 12 лет назад

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat ...

github
около 3 лет назад

Cross-Site Request Forgery in Apache Tomcat

EPSS

Процентиль: 95%
0.16411
Средний

4.3 Medium

CVSS2