Show plain JSON{"id": "CVE-2012-4529", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-10-28T21:55:04.923", "references": [{"url": "http://ocpsoft.org/support/topic/session-id-is-appended-as-url-path-parameter-in-very-first-request/", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0834.html", "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-0839.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "https://issues.jboss.org/browse/JBWEB-249", "source": "secalert@redhat.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log."}, {"lang": "es", "value": "El m\u00e9todo org.apache.catalina.connector.Response.encodeURL en Red Hat JBoss Web 7.1.x y anteriores, cuando el modo de traceo est\u00e1 fijado a COOKIE, envia el par\u00e1metro jsessionid en la URL de la primera respuesta de una sesion, lo que permite a atacantes remotos obtener el id de sesion a treves de un ataque man-in-the-middle o leyendo un log"}], "lastModified": "2013-10-30T14:49:44.890", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E56D6F43-7E18-4979-A68F-56B881EE9B70", "versionEndIncluding": "7.1.1"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5487FC1A-8A76-4719-B5DE-80B662902C69"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5BF0A1-E061-48B6-A7B3-61AE5F800FA4"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66201A00-DE78-427F-9D11-22FCE85972DF"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDA3CBD4-EB52-4140-AEBA-33B8E4219F00"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:6.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBF501A2-546D-4090-B237-F00A6A2F677F"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "929FDE1E-18FF-4806-A568-96927846CF17"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D91749FE-C609-4DB9-A114-C7897FC3C2C9"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F962612-A75E-4813-B02F-279326F99FEF"}, {"criteria": "cpe:2.3:a:redhat:jboss_community_application_server:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB021539-4AEF-4A23-AC2A-AFA47B3E68A1"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}