JAMF Software's Casper Suite is susceptible to a cross-site request forgery (CSRF) (CWE-352) vulnerability.
JAMF Software's Casper Suite, a Mac OS X and iOS client management framework, contains a cross-site request forgery (CSRF) (CWE-352) vulnerability. The reporter provided a proof-of-concept that created a new user and modified the password for an existing user.
By convincing the user to follow a specifically crafted URL, an attacker may be able to execute commands in the context of the logged in user.
Apply an Update
Casper Suite 8.61 has been released to address this vulnerability. Users should contact JAMF Software to obtain this version.
If you cannot update for whatever reason, please consider the following workarounds.
Do not click on links
Do not follow links from emails or instant messages. Always access the management interface by typing in the web address or using a known good bookmark.
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the site using stolen credentials from a blocked network location.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: August 15, 2012 Updated: September 24, 2012
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal | 5.8 | E:POC/RL:W/RC:C
Environmental | 5.8 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
Thanks to Jacob Holcomb for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2012-4051
Date Public: | 2012-09-24
Date First Published: | 2012-09-24
Date Last Updated: | 2012-09-25 14:00 UTC
Document Revision: | 23