SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   Red Hat
Red Hat JBoss Fuse/A-MQ Authentication Cookie Attribute Wrapping Lets Remote Users Hijack the Target User's Session
SecurityTracker Alert ID:  1041750
SecurityTracker URL:  https://securitytracker.com/id/1041750
CVE Reference:   CVE-2015-5183   (Links to External Site)
Date:  Oct 2 2018
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.3, A-MQ 6.3
Description:   A vulnerability was reported in Red Hat JBoss Fuse/A-MQ. A remote user can hijack the target user's session.

The JBoss A-MQ's Hawtio console does not set 'HTTPOnly' or 'Secure' attributes on authentication cookies. A remote user that can conduct a man-in-the-middle attack may be able to retrieve a valid authenticated user's SessionID and conduct further session hijacking attacks.

Naftali Rosenbaum (Comsec Consulting) reported this vulnerability.

Impact:   A remote user can hijack the target user's session.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2018:2840

Vendor URL:  access.redhat.com/errata/RHSA-2018:2840 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)

Message History:   None.


 Source Message Contents

Subject:  [RHSA-2018:2840-01] Low: Red Hat JBoss Fuse/A-MQ 6.3 R9 security and bug fix update


[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.