IBM Rational Build Forge 7.1.0 uses the HTTP GET method during redirection from the authentication servlet to a PHP script, which makes it easier for context-dependent attackers to discover session IDs by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
References
Configurations
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ibm.com/support/docview.wss?uid=swg1PM29655 - | |
References | () http://www.vupen.com/english/advisories/2011/0919 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66714 - |
Information
Published : 2011-04-28 18:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-1839
Mitre link : CVE-2011-1839
CVE.ORG link : CVE-2011-1839
JSON object : View
Products Affected
ibm
- rational_build_forge
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor