SB2017051912 - Open redirect in jUDDI



SB2017051912 - Open redirect in jUDDI

Published: May 19, 2017 Updated: August 8, 2020

Security Bulletin ID SB2017051912
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Open redirect (CVE-ID: CVE-2015-5241)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.


Remediation

Install update from vendor's website.