The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.madirish.net/?article=471 | |
http://e107.org/comment.php?comment.news.872 | |
http://www.securitytracker.com/id?1024351 | vdb entry |
http://secunia.com/advisories/41034 | third party advisory vendor advisory |