CVE-2015-5188

Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:jboss_wildfly_application_server:*:cr8:*:*:*:*:*:*

History

12 Feb 2023, 23:15

Type Values Removed Values Added
Summary It was discovered that when uploading a file using a multipart/form-data submission to the EAP Web Console, the Console was vulnerable to Cross-Site Request Forgery (CSRF). This meant that an attacker could use the flaw together with a forgery attack to make changes to an authenticated instance. Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission.
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1904', 'name': 'https://access.redhat.com/errata/RHSA-2015:1904', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2015-5188', 'name': 'https://access.redhat.com/security/cve/CVE-2015-5188', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1906', 'name': 'https://access.redhat.com/errata/RHSA-2015:1906', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1905', 'name': 'https://access.redhat.com/errata/RHSA-2015:1905', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:1907', 'name': 'https://access.redhat.com/errata/RHSA-2015:1907', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 20:20

Type Values Removed Values Added
Summary Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission. It was discovered that when uploading a file using a multipart/form-data submission to the EAP Web Console, the Console was vulnerable to Cross-Site Request Forgery (CSRF). This meant that an attacker could use the flaw together with a forgery attack to make changes to an authenticated instance.
References
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1904 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2015-5188 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1906 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1905 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:1907 -

Information

Published : 2015-10-27 16:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-5188

Mitre link : CVE-2015-5188

CVE.ORG link : CVE-2015-5188


JSON object : View

Products Affected

redhat

  • jboss_wildfly_application_server
  • jboss_enterprise_application_platform
CWE
CWE-352

Cross-Site Request Forgery (CSRF)