{
  "threat_severity" : "Moderate",
  "public_date" : "2012-12-04T00:00:00Z",
  "bugzilla" : {
    "description" : "Tomcat/JBoss Web - Bypass of CSRF prevention filter",
    "id" : "883636",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=883636"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-352",
  "details" : [ "org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier." ],
  "statement" : "This issue did not affect the versions of tomcat5 as shipped with Red Hat Enterprise Linux 5 and tomcat6 as shipped with Red Hat Enterprise Linux 6 as they did not include the CSRF prevention filter.",
  "affected_release" : [ {
    "product_name" : "JBoss Data Grid 6.1",
    "release_date" : "2013-03-20T00:00:00Z",
    "advisory" : "RHSA-2013:0665",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:6.1.0"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.0",
    "release_date" : "2013-03-14T00:00:00Z",
    "advisory" : "RHSA-2013:0648",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6 for RHEL 5",
    "release_date" : "2013-03-14T00:00:00Z",
    "advisory" : "RHSA-2013:0647",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
    "package" : "jbossweb-0:7.0.17-4.Final_redhat_3.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6 for RHEL 6",
    "release_date" : "2013-03-14T00:00:00Z",
    "advisory" : "RHSA-2013:0647",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
    "package" : "jbossweb-0:7.0.17-4.Final_redhat_3.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 5",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0266",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
    "package" : "tomcat6-0:6.0.35-6_patch_06.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 5",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0268",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
    "package" : "tomcat7-0:7.0.30-3_patch_02.ep6.el5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0266",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat6-0:6.0.35-29_patch_06.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0268",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat7-0:7.0.30-5_patch_02.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3.2",
    "release_date" : "2013-12-17T00:00:00Z",
    "advisory" : "RHSA-2013:1853",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3.2.0"
  }, {
    "product_name" : "Red Hat JBoss Portal Platform 6.1",
    "release_date" : "2013-10-16T00:00:00Z",
    "advisory" : "RHSA-2013:1437",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.0",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0265",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.0"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.0",
    "release_date" : "2013-02-19T00:00:00Z",
    "advisory" : "RHSA-2013:0267",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "tomcat6",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat JBoss BRMS 5",
    "fix_state" : "Not affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:5"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 6",
    "fix_state" : "Affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:6"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3",
    "fix_state" : "Not affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3"
  }, {
    "product_name" : "Red Hat JBoss Portal 5",
    "fix_state" : "Not affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_portal_platform:5"
  }, {
    "product_name" : "Red Hat JBoss Portal 6",
    "fix_state" : "Affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_portal_platform:6"
  }, {
    "product_name" : "Red Hat JBoss SOA Platform 5",
    "fix_state" : "Not affected",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_soa_platform:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-4431\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-4431\nhttp://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.36\nhttp://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.32" ],
  "name" : "CVE-2012-4431",
  "csaw" : false
}