Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/61805 - | |
References | () http://secunia.com/advisories/38195 - Vendor Advisory | |
References | () http://www.ngenuity.org/wordpress/2010/01/14/ngenuity-2010-002-zenoss-multiple-admin-csrf/ - | |
References | () http://www.securityfocus.com/archive/1/508982/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/37843 - Exploit | |
References | () http://www.zenoss.com/news/SQL-Injection-and-Cross-Site-Forgery-in-Zenoss-Core-Corrected.html - Vendor Advisory |
Information
Published : 2010-02-26 17:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0713
Mitre link : CVE-2010-0713
CVE.ORG link : CVE-2010-0713
JSON object : View
Products Affected
zenoss
- zenoss
CWE
CWE-352
Cross-Site Request Forgery (CSRF)