CVE-2016-7034

The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not properly handle CSRF tokens generated during an active session and includes them in query strings, which makes easier for remote attackers to (1) bypass CSRF protection mechanisms or (2) conduct cross-site request forgery (CSRF) attacks by obtaining an old token.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:jboss_bpm_suite:6.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:57

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2017-0557.html - () http://rhn.redhat.com/errata/RHSA-2017-0557.html -
References () http://www.securityfocus.com/bid/92760 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92760 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0296 - () https://access.redhat.com/errata/RHSA-2018:0296 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1373347 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1373347 - Issue Tracking

Information

Published : 2016-09-07 18:59

Updated : 2024-11-21 02:57


NVD link : CVE-2016-7034

Mitre link : CVE-2016-7034

CVE.ORG link : CVE-2016-7034


JSON object : View

Products Affected

redhat

  • jboss_bpm_suite
CWE
CWE-352

Cross-Site Request Forgery (CSRF)