In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote media server. (Also, anonymous access can be achieved in applications that do not have a user login area).
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/Tautulli/Tautulli/compare/v2.1.9...v2.1.10-beta | third party advisory release notes |
http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html | exploit vdb entry third party advisory |