Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, does not properly restrict access to resources, which allows remote attackers to obtain sensitive information via unspecified vectors related to (1) "web pages," (2) "export functionality," and (3) "image viewing."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=829421 | exploit |
http://www.securityfocus.com/bid/55618 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2012-1278.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78770 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2012-1281.html | vendor advisory |
http://secunia.com/advisories/50660 | third party advisory |