Rapid7 Vulnerability & Exploit Database

Red Hat JBoss: CVE-2012-4529: Remote attackers could obtain the session id via a man-in-the-middle attack or reading a log

Back to Search

Red Hat JBoss: CVE-2012-4529: Remote attackers could obtain the session id via a man-in-the-middle attack or reading a log

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
10/28/2013
Created
07/25/2018
Added
08/01/2017
Modified
08/01/2017

Description

The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.

Solution(s)

  • jboss_enterprise_application_platform-cve-2012-4529-1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;