Multiple cross-site request forgery (CSRF) vulnerabilities in Kasseler CMS before 2 r1232 allow remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the (1) groups[] parameter in a send action in the sendmail module or (2) query parameter in a sql_query action in the database module to admin.php, related to CVE-2013-3727.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://osvdb.org/94781 | vdb entry |
https://www.htbridge.com/advisory/HTB23158 | exploit |
http://seclists.org/bugtraq/2013/Jul/26 | exploit mailing list |
http://diff.kasseler-cms.net/svn.html | |
http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html | exploit |
http://diff.kasseler-cms.net/svn/patches/1232.html | patch vendor advisory |