Hey Everyone, I am part of a mailing group taht posts vulnerabilities and one came up for sesame. Sounds like its been fixed with v1.0.1
TITLE:
Sesame Unauthorised User Repository Access Vulnerability
SECUNIA ADVISORY ID:
SA11497
VERIFY ADVISORY:
http://secunia.com/advisories/11497/CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information
WHERE:
>From remote
SOFTWARE:
Sesame 1.0.x
DESCRIPTION:
A vulnerability has been discovered in Sesame, which can be exploited
by malicious, anonymous users to access other user's repositories.
The vulnerability is caused due to an unspecified error in the
servlets. The issue reportedly surfaced on Tomcat 5, which reuses
threads to handle requests.
Successful exploitation grants a user full access to the repository
of a logged in user.
SOLUTION:
Update to version 1.0.1.
http://sourceforge.net/project/showfiles.php?group_id=46509PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/