Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 allows remote attackers to hijack agent sessions via an agent registration request without a security token.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jboss_operations_network | Redhat | * | 2.4.1 (including) |
Jboss_operations_network | Redhat | 2.0.0 (including) | 2.0.0 (including) |
Jboss_operations_network | Redhat | 2.0.1 (including) | 2.0.1 (including) |
Jboss_operations_network | Redhat | 2.1.0 (including) | 2.1.0 (including) |
Jboss_operations_network | Redhat | 2.2 (including) | 2.2 (including) |
Jboss_operations_network | Redhat | 2.3 (including) | 2.3 (including) |
Jboss_operations_network | Redhat | 2.3.1 (including) | 2.3.1 (including) |
Jboss_operations_network | Redhat | 2.4 (including) | 2.4 (including) |
Jboss_operations_network | Redhat | 3.0 (including) | 3.0 (including) |
Red Hat JBoss Operations Network 2.4 | RedHat | * | |
Red Hat JBoss Operations Network 3.0 | RedHat | * |