Security
Headlines
HeadlinesLatestCVEs

Tag

#csrf

CVE-2020-2196: Jenkins Security Advisory 2020-06-03

Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.

CVE
#xss#csrf#vulnerability#mac#sap
CVE-2020-13414: PSIRT Advisories — aviatrix_docs documentation

An issue was discovered in Aviatrix Controller before 5.4.1204. It contains credentials unused by the software.

CVE-2020-13413: PSIRT Advisories — aviatrix_docs documentation

An issue was discovered in Aviatrix Controller before 5.4.1204. There is a Observable Response Discrepancy from the API, which makes it easier to perform user enumeration via brute force.

CVE-2019-20804: XSS + CSRF - Admin account takeover · Issue #57 · GilaCMS/gila

Gila CMS before 1.11.6 allows CSRF with resultant XSS via the admin/themes URI, leading to compromise of the admin account.

CVE-2020-13231: CSRF at Admin Email · Issue #3342 · Cacti/cacti

In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change.

CVE-2020-11069: Build software better, together

In TYPO3 CMS 9.0.0 through 9.5.16 and 10.0.0 through 10.4.1, it has been discovered that the backend user interface and install tool are vulnerable to a same-site request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server. Scripts are then executed with the privileges of the victims' user session. In a worst-case scenario, new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it's actually a same-site request forgery. Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a third party extension, e.g. file upload in a contact form with knowing the target location. To be successful, the attacked victim requires an active ...

CVE-2020-11060: Drop xml backup; check new versions from config · glpi-project/glpi@ad748d5

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

CVE-2020-5517: Public CVEs (Joas Antonio)

CSRF in the /login URI in BlueOnyx 5209R allows an attacker to access the dashboard and perform scraping or other analysis.

CVE-2020-12625: Release Roundcube Webmail 1.4.4 · roundcube/roundcubemail

An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.