VYPR
Medium severity6.1NVD Advisory· Published May 19, 2017· Updated May 13, 2026

CVE-2015-5241

CVE-2015-5241

Description

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.juddi:juddi-clientMaven
>= 3.1.2, < 3.2.03.2.0

Affected products

5
  • Apache/Juddi4 versions
    cpe:2.3:a:apache:juddi:3.1.3:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:apache:juddi:3.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:juddi:3.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:juddi:3.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:juddi:3.1.2:*:*:*:*:*:*:*
  • Apache Software Foundation/Apache jUDDIv5
    Range: 3.1.2, 3.1.3, 3.1.4, and 3.1.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.