The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not properly handle CSRF tokens generated during an active session and includes them in query strings, which makes easier for remote attackers to (1) bypass CSRF protection mechanisms or (2) conduct cross-site request forgery (CSRF) attacks by obtaining an old token.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0557.html | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0296 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1373347 | issue tracking |
http://www.securityfocus.com/bid/92760 | third party advisory vdb entry |