CVE-2011-1839

IBM Rational Build Forge 7.1.0 uses the HTTP GET method during redirection from the authentication servlet to a PHP script, which makes it easier for context-dependent attackers to discover session IDs by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ibm:rational_build_forge:7.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://www.ibm.com/support/docview.wss?uid=swg1PM29655 - () http://www.ibm.com/support/docview.wss?uid=swg1PM29655 -
References () http://www.vupen.com/english/advisories/2011/0919 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0919 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66714 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66714 -

Information

Published : 2011-04-28 18:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-1839

Mitre link : CVE-2011-1839

CVE.ORG link : CVE-2011-1839


JSON object : View

Products Affected

ibm

  • rational_build_forge
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor