Multiple cross-site request forgery (CSRF) vulnerabilities in Scriptsez.net Ez Poll Hoster (EPH) allow remote attackers to (1) hijack the authentication of arbitrary users for requests that delete polls via the delete_poll action to index.php; and hijack the authentication of administrators for requests that (2) delete users via the manage action to admin.php, or (3) send arbitrary email to arbitrary users in the email action to admin.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/3529 | vdb entry vendor advisory |
http://secunia.com/advisories/37716 | third party advisory vendor advisory |
http://www.exploit-db.com/exploits/10439 | exploit |
http://packetstormsecurity.org/0912-exploits/ezpollhoster-xssxsrf.txt | exploit |