Multiple cross-site request forgery (CSRF) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to hijack the authentication of administrators for requests that add, delete, or modify sensitive information, as demonstrated by adding an administrator account via an add action to admin/accounts/add/.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-10/0096.html | mailing list exploit |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5106.php | exploit |
https://www.htbridge.com/advisory/HTB23113 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78469 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79469 | vdb entry |
http://packetstormsecurity.org/files/117460/Subrion-CMS-2.2.1-XSS-CSRF-SQL-Injection.html | |
http://www.osvdb.org/85999 | vdb entry |
http://www.subrion.com/forums/announcements/934-subrion-2-2-3-open-source-cms-core-available.html | vendor advisory |
http://packetstormsecurity.org/files/116433 | exploit |
http://secunia.com/advisories/51013 | third party advisory vendor advisory |