GSD-2017-6086
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to <vimbadmin directory>/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to <vimbadmin directory>/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to <vimbadmin directory>/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to <vimbadmin directory>/application/controllers/AliasController.php.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-6086",
"description": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php.",
"id": "GSD-2017-6086",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2017-6086"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-6086"
],
"details": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php.",
"id": "GSD-2017-6086",
"modified": "2023-12-13T01:21:09.340451Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6086",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41967",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41967/"
},
{
"name": "[oss-security] 20170503 [CVE-2017-6086] Multiple CSRF vulnerabilities in ViMbAdmin version 3.0.15",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/05/03/7"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "=3.0.15",
"affected_versions": "Version 3.0.15",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-352",
"CWE-937"
],
"date": "2017-08-16",
"description": "Multiple cross-site request forgery vulnerabilities are present in vimbadmin.",
"fixed_versions": [],
"identifier": "CVE-2017-6086",
"identifiers": [
"CVE-2017-6086"
],
"not_impacted": "",
"package_slug": "packagist/opensolutions/vimbadmin",
"pubdate": "2017-06-27",
"solution": "Unfortunately, there is no solution available yet.",
"title": "Cross-Site Request Forgery (CSRF)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-6086"
],
"uuid": "13ca0d20-d06f-4292-85d4-1ddae0749008"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:vimbadmin:vimbadmin:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6086"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to \u003cvimbadmin directory\u003e/application/controllers/AliasController.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20170503 [CVE-2017-6086] Multiple CSRF vulnerabilities in ViMbAdmin version 3.0.15",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/05/03/7"
},
{
"name": "41967",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/41967/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2017-08-16T01:29Z",
"publishedDate": "2017-06-27T20:29Z"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…