You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
mend-for-github-combot
changed the title
CVE-2012-4529 (Medium) detected in tomcat-catalina-7.0.42.jar
CVE-2012-4529 (Low) detected in tomcat-catalina-7.0.42.jar
Dec 14, 2021
CVE-2012-4529 - Low Severity Vulnerability
Vulnerable Library - tomcat-catalina-7.0.42.jar
Tomcat Servlet Engine Core Classes and Standard implementations
Library home page: http://tomcat.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /repository/org/apache/tomcat/tomcat-catalina/7.0.42/tomcat-catalina-7.0.42.jar
Dependency Hierarchy:
Found in HEAD commit: 630f758cd843b129965c1658c5baf81a8deff375
Found in base branches: dev, master
Vulnerability Details
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
Publish Date: 2013-10-28
URL: CVE-2012-4529
CVSS 3 Score Details (3.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2012-4529
Release Date: 2013-10-28
Fix Resolution: 7.0.88
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: