Medium severity6.1NVD Advisory· Published May 19, 2017· Updated May 13, 2026
CVE-2015-5241
CVE-2015-5241
Description
After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.juddi:juddi-clientMaven | >= 3.1.2, < 3.2.0 | 3.2.0 |
Affected products
5- Apache Software Foundation/Apache jUDDIv5Range: 3.1.2, 3.1.3, 3.1.4, and 3.1.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- juddi.apache.org/security.htmlnvdMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-49h4-g8p5-jgq6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-5241ghsaADVISORY
News mentions
0No linked articles in our index yet.