Multiple cross-site request forgery (CSRF) vulnerabilities in user/main/update_user in DiamondList 0.1.6, and possibly earlier, allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrative password or (2) change the site's configuration.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://osvdb.org/66918 | vdb entry |
http://marc.info/?l=bugtraq&m=128104130309426&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/60937 | vdb entry |
http://secunia.com/advisories/40873 | third party advisory vendor advisory |
http://dev.hulihanapplications.com/issues/show/212 | vendor advisory |
http://www.exploit-db.com/exploits/14565 | exploit |
http://www.htbridge.ch/advisory/xsrf_csrf_in_diamondlist.html | |
http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt |