#VU38967 Open redirect in jUDDI - CVE-2015-5241

 

#VU38967 Open redirect in jUDDI - CVE-2015-5241

Published: May 19, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38967
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-5241
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
jUDDI
Software vendor:
Apache Foundation

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.


Remediation

Install update from vendor's website.

External links