Open redirect in jUDDI - CVE-2015-5241

 

Open redirect in jUDDI - CVE-2015-5241

Published: May 19, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38967
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-5241
CWE-ID: CWE-601
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Apache Foundation
Affected software:
jUDDI

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.


How to mitigate CVE-2015-5241

Install update from vendor's website.

Sources