var-201202-0093
Vulnerability from variot

Multiple cross-site request forgery (CSRF) vulnerabilities on the eAccess Pocket WiFi (aka GP02) router before 2.00 with firmware 11.203.11.05.168 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Pocket WiFi (GP02) contains a cross-site request forgery vulnerability. Pocket WiFi (GP02) provided by eAccess Ltd. is a mobile wireless LAN router. Pocket WiFi (GP02) contains a cross-site request forgery vulnerability. Naoto Katsumi of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of Pocket WiFi (GP02) may be initialized, or Pocket WiFi (GP02) may be rebooted. Successful exploits can result in privileged commands running on the affected devices, including changing settings and rebooting the device. This may lead to further network-based attacks. ----------------------------------------------------------------------

Secunia is hiring!

Find your next job here:

http://secunia.com/company/jobs/


TITLE: Emobile Pocket WiFi GP02 Cross-Site Request Forgery Vulnerability

SECUNIA ADVISORY ID: SA47795

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47795/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47795

RELEASE DATE: 2012-02-01

DISCUSS ADVISORY: http://secunia.com/advisories/47795/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/47795/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=47795

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in Emobile Pocket Wifi GP02, which can be exploited by malicious people to conduct cross-site request forgery attacks.

The device's web interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. change settings and reboot the device by tricking a logged in user into visiting a malicious web site.

SOLUTION: Install update. Please see the vendor's link for details.

PROVIDED AND/OR DISCOVERED BY: JVN credits Naoto Katsumi, LAC Co.

ORIGINAL ADVISORY: JVN (English): http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000010.html http://jvn.jp/en/jp/JVN33021167/index.html

JVN (Japanese): http://jvn.jp/jp/JVN33021167/index.html

Emobile: http://emobile.jp/topics/info20120201_01.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201202-0093",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pocket wifi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emobile",
        "version": "2.0"
      },
      {
        "model": "pocket wifi",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "emobile",
        "version": "11.203.11.05.168"
      },
      {
        "model": "emobile pocket wifi gp02",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "eaccess",
        "version": "11.203.11.05.168"
      },
      {
        "model": "pocket wifi",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "eaccess",
        "version": "firmware version 11.203.11.05.168  earlier"
      },
      {
        "model": "pocket wifi",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emobile",
        "version": "11.203.11.05.168"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:emobile:pocket_wifi",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Naoto Katsumi of LAC Co",
    "sources": [
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-0314",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2012-0314",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 4.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2012-000010",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-53595",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-0314",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2012-000010",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201202-040",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-53595",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site request forgery (CSRF) vulnerabilities on the eAccess Pocket WiFi (aka GP02) router before 2.00 with firmware 11.203.11.05.168 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) initialize settings or (2) reboot the device. Pocket WiFi (GP02) contains a cross-site request forgery vulnerability. Pocket WiFi (GP02) provided by eAccess Ltd. is a mobile wireless LAN router. Pocket WiFi (GP02) contains a cross-site request forgery vulnerability. Naoto Katsumi of LAC Co., Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged in, settings of Pocket WiFi (GP02) may be initialized, or Pocket WiFi (GP02) may be rebooted. \nSuccessful exploits can result in privileged commands running on the affected devices, including changing settings and rebooting the device. This may lead to further network-based  attacks. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nEmobile Pocket WiFi GP02 Cross-Site Request Forgery Vulnerability\n\nSECUNIA ADVISORY ID:\nSA47795\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47795/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47795\n\nRELEASE DATE:\n2012-02-01\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47795/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47795/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47795\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Emobile Pocket Wifi GP02, which\ncan be exploited by malicious people to conduct cross-site request\nforgery attacks. \n\nThe device\u0027s web interface allows users to perform certain actions\nvia HTTP requests without performing any validity checks to verify\nthe requests. This can be exploited to e.g. change settings and\nreboot the device by tricking a logged in user into visiting a\nmalicious web site. \n\nSOLUTION:\nInstall update. Please see the vendor\u0027s link for details. \n\nPROVIDED AND/OR DISCOVERED BY:\nJVN credits Naoto Katsumi, LAC Co. \n\nORIGINAL ADVISORY:\nJVN (English):\nhttp://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000010.html\nhttp://jvn.jp/en/jp/JVN33021167/index.html\n\nJVN (Japanese):\nhttp://jvn.jp/jp/JVN33021167/index.html\n\nEmobile:\nhttp://emobile.jp/topics/info20120201_01.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "PACKETSTORM",
        "id": "109350"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-0314",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN33021167",
        "trust": 2.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "47795",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "51782",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#33021167",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "109350",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "PACKETSTORM",
        "id": "109350"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "id": "VAR-201202-0093",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      }
    ],
    "trust": 1.45
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:27:34.333000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Update information -- 2012/2/1 Pocket WiFi (GP02) available",
        "trust": 0.8,
        "url": "http://emobile.jp/topics/info20120201_01.html"
      },
      {
        "title": "Emobile Pocket WiFi GP02 Cross-Site Request Forgery Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/8686"
      },
      {
        "title": "GP02_Firm_Update_win_V2_00",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42570"
      },
      {
        "title": "GP02_Firm_Update_mac_V2_00",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42571"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://jvn.jp/en/jp/jvn33021167/index.html"
      },
      {
        "trust": 1.8,
        "url": "http://emobile.jp/topics/info20120201_01.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/51782"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000010"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/47795"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0314"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0314"
      },
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/47795/"
      },
      {
        "trust": 0.4,
        "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000010.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.jvn.jp/en/jp/jvn33021167/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://emobile.jp/products/hw/gp02/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47795/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn33021167/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/jobs/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47795"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "PACKETSTORM",
        "id": "109350"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "db": "PACKETSTORM",
        "id": "109350"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-02-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "date": "2012-02-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "date": "2012-02-01T00:00:00",
        "db": "BID",
        "id": "51782"
      },
      {
        "date": "2012-02-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "date": "2012-02-02T03:30:42",
        "db": "PACKETSTORM",
        "id": "109350"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "date": "2012-02-03T04:05:51.333000",
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-02-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "date": "2012-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-53595"
      },
      {
        "date": "2012-02-01T00:00:00",
        "db": "BID",
        "id": "51782"
      },
      {
        "date": "2012-02-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000010"
      },
      {
        "date": "2012-02-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      },
      {
        "date": "2024-11-21T01:34:46.913000",
        "db": "NVD",
        "id": "CVE-2012-0314"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Emobile Pocket WiFi GP02 Cross-Site Request Forgery Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-0386"
      },
      {
        "db": "BID",
        "id": "51782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      }
    ],
    "trust": 1.5
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201202-040"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…