CVE-2017-6086 (GCVE-0-2017-6086)
Vulnerability from cvelistv5 – Published: 2017-06-27 20:00 – Updated: 2024-08-05 15:18
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to <vimbadmin directory>/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to <vimbadmin directory>/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to <vimbadmin directory>/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to <vimbadmin directory>/application/controllers/AliasController.php.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
2 references
| URL | Tags |
|---|---|
| https://www.exploit-db.com/exploits/41967/ | exploitx_refsource_EXPLOIT-DB |
| http://www.openwall.com/lists/oss-security/2017/05/03/7 | mailing-listx_refsource_MLIST |
Date Public ?
2017-05-03 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "41967",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41967/"
},
{
"name": "[oss-security] 20170503 [CVE-2017-6086] Multiple CSRF vulnerabilities in ViMbAdmin version 3.0.15",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2017/05/03/7"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-05-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-15T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "41967",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41967/"
},
{
"name": "[oss-security] 20170503 [CVE-2017-6086] Multiple CSRF vulnerabilities in ViMbAdmin version 3.0.15",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2017/05/03/7"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6086",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41967",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41967/"
},
{
"name": "[oss-security] 20170503 [CVE-2017-6086] Multiple CSRF vulnerabilities in ViMbAdmin version 3.0.15",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/05/03/7"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-6086",
"datePublished": "2017-06-27T20:00:00.000Z",
"dateReserved": "2017-02-18T00:00:00.000Z",
"dateUpdated": "2024-08-05T15:18:49.781Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-6086",
"date": "2026-05-19",
"epss": "0.00168",
"percentile": "0.37505"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vimbadmin:vimbadmin:3.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E264D9F-A7D6-4DCA-AE55-AFB9CD71B3EC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de tipo cross-site request forgery (CSRF) en las funciones addAction y purgeAction en ViMbAdmin versi\\u00f3n 3.0.15, permiten a los atacantes remotos secuestrar la identificaci\\u00f3n de administradores registrados para (1) agregar un usuario administrador por medio de una petici\\u00f3n POST especialmente dise\\u00f1ada en /application/controllers/DomainController.php, (2) eliminar un usuario administrador por medio de una petici\\u00f3n GET especialmente dise\\u00f1ada en /application/controllers/DomainController.php, (3) cambiar un administrador contrase\\u00f1a por medio de una petici\\u00f3n POST especialmente dise\\u00f1ada en /application/controllers/DomainController.php, (4) a\\u00f1adir un buz\\u00f3n por medio de una petici\\u00f3n POST especialmente dise\\u00f1ada en /application/controllers/MailboxController.php, (5) eliminar un Buz\\u00f3n de correo por medio de una petici\\u00f3n POST especialmente dise\\u00f1ada en /application/controllers/MailboxController.php, (6) archivar una direcci\\u00f3n de buz\\u00f3n por medio de una petici\\u00f3n GET especialment dise\\u00f1ada en /application/controllers/ArchiveController.php, (7) a\\u00f1adir una direcci\\u00f3n de alias por medio de una petici\\u00f3n POST especialmente dise\\u00f1ada en /application/controllers/AliasController.php, o (8) eliminar una direcci\\u00f3n de alias por medio de una petici\\u00f3n GET especialmente dise\\u00f1ada en /application/controllers/AliasController.php.\"}]",
"id": "CVE-2017-6086",
"lastModified": "2024-11-21T03:29:03.653",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-06-27T20:29:01.010",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2017/05/03/7\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41967/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2017/05/03/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41967/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-352\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-6086\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-06-27T20:29:01.010\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de tipo cross-site request forgery (CSRF) en las funciones addAction y purgeAction en ViMbAdmin versi\u00f3n 3.0.15, permiten a los atacantes remotos secuestrar la identificaci\u00f3n de administradores registrados para (1) agregar un usuario administrador por medio de una petici\u00f3n POST especialmente dise\u00f1ada en /application/controllers/DomainController.php, (2) eliminar un usuario administrador por medio de una petici\u00f3n GET especialmente dise\u00f1ada en /application/controllers/DomainController.php, (3) cambiar un administrador contrase\u00f1a por medio de una petici\u00f3n POST especialmente dise\u00f1ada en /application/controllers/DomainController.php, (4) a\u00f1adir un buz\u00f3n por medio de una petici\u00f3n POST especialmente dise\u00f1ada en /application/controllers/MailboxController.php, (5) eliminar un Buz\u00f3n de correo por medio de una petici\u00f3n POST especialmente dise\u00f1ada en /application/controllers/MailboxController.php, (6) archivar una direcci\u00f3n de buz\u00f3n por medio de una petici\u00f3n GET especialment dise\u00f1ada en /application/controllers/ArchiveController.php, (7) a\u00f1adir una direcci\u00f3n de alias por medio de una petici\u00f3n POST especialmente dise\u00f1ada en /application/controllers/AliasController.php, o (8) eliminar una direcci\u00f3n de alias por medio de una petici\u00f3n GET especialmente dise\u00f1ada en /application/controllers/AliasController.php.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vimbadmin:vimbadmin:3.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E264D9F-A7D6-4DCA-AE55-AFB9CD71B3EC\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2017/05/03/7\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41967/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/05/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41967/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…