Author: buildbot
Date: Thu May 18 23:34:36 2017
New Revision: 1012496
Log:
Staging update by buildbot for juddi
Modified:
websites/staging/juddi/trunk/content/ (props changed)
websites/staging/juddi/trunk/content/security.html
Propchange: websites/staging/juddi/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu May 18 23:34:36 2017
@@ -1 +1 @@
-1795570
+1795571
Modified: websites/staging/juddi/trunk/content/security.html
==============================================================================
--- websites/staging/juddi/trunk/content/security.html (original)
+++ websites/staging/juddi/trunk/content/security.html Thu May 18 23:34:36 2017
@@ -174,8 +174,8 @@ h2:hover > .headerlink, h3:hover > .head
<h2 id="security-advisories-for-apache-juddi">Security Advisories for Apache
jUDDI<a class="headerlink" href="#security-advisories-for-apache-juddi"
title="Permanent link">¶</a></h2>
<h3 id="cveidcve-2015-5241">CVEID:CVE-2015-5241<a class="headerlink"
href="#cveidcve-2015-5241" title="Permanent link">¶</a></h3>
<p>VERSION: 3.1.2, 3.1.3, 3.1.4, and 3.1.5 utilize the portlets based user
interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or
'uddi-console'</p>
-<p>PROBLEMTYPE:Open Redirect</p>
-<p>REFERENCES:https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E</p>
+<p>PROBLEMTYPE: Open Redirect</p>
+<p>REFERENCES: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5241</p>
<p>DESCRIPTION: After logging into the portal, the logout jsp page redirects
the browser back to the login page after. It is feasible for malicious user to
redirect the browser to an unintended web page. User session data, credentials,
and auth tokens are cleared before the redirect.</p>
<p>Mitigations:</p>
<p>1) Remove or disable the portlet's based user interface.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]