Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214 | vendor advisory |
http://www.vupen.com/english/advisories/2009/1089 | vdb entry |
http://www.securityfocus.com/bid/34562 | vdb entry exploit |
http://issues.apache.org/jira/browse/GERONIMO-4597 | vendor advisory |
http://secunia.com/advisories/34715 | third party advisory |
http://www.securityfocus.com/archive/1/502735/100/0/threaded | mailing list |
http://dsecrg.com/pages/vul/show.php?id=120 |