Cross-site request forgery (CSRF) vulnerability in Cherokee-admin in Cherokee before 1.2.99 allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences, as demonstrated by a crafted nickname field to vserver/apply.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/49772 | vdb entry |
http://seclists.org/fulldisclosure/2011/Jun/0 | mailing list |
http://www.openwall.com/lists/oss-security/2011/06/06/22 | exploit mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html | vendor advisory |
https://launchpad.net/bugs/784632 | exploit |
http://www.openwall.com/lists/oss-security/2011/06/02/2 | mailing list |
http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz | patch |
https://bugzilla.redhat.com/show_bug.cgi?id=713304 | patch exploit |
http://www.openwall.com/lists/oss-security/2011/06/03/6 | exploit mailing list |
http://osvdb.org/72693 | vdb entry |