Vulnerability Description
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-3359 for the base64-encoded storage of the user and password in a cookie.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Conga | All versions |
| Redhat | Enterprise Linux | 5 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-0128.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=607179
- http://rhn.redhat.com/errata/RHSA-2013-0128.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=607179
FAQ
What is CVE-2013-7347?
CVE-2013-7347 is a vulnerability with a CVSS score of 3.7 (LOW). Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT...
How severe is CVE-2013-7347?
CVE-2013-7347 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7347?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Conga, Redhat Enterprise Linux.