Session Hijacking via JRun URL Rewriting

Session Hijacking via JRun URL Rewriting

CVE-2001-1545 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing.

Learn more about our Web Application Penetration Testing UK.