CVE-2012-4252

Multiple cross-site request forgery (CSRF) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to hijack the authentication of administrators for requests that (1) remove file access restriction via a deletehtaccess action, (2) drop a database via a kill value in a db action, (3) uninstall the application via a 101 value in the phase parameter to learn/cubemail/install.php, (4) delete config.php via a 2 value in the phase parameter to learn/cubemail/install.php, (5) change a password via a schutz action, or (6) execute arbitrary SQL commands via the sql_statement parameter to learn/cubemail/sql.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:42

Type Values Removed Values Added
References () http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html - Exploit () http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html - Exploit
References () http://www.osvdb.org/81613 - () http://www.osvdb.org/81613 -
References () http://www.securityfocus.com/bid/53306 - Exploit () http://www.securityfocus.com/bid/53306 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/75285 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/75285 -

Information

Published : 2012-08-13 18:55

Updated : 2024-11-21 01:42


NVD link : CVE-2012-4252

Mitre link : CVE-2012-4252

CVE.ORG link : CVE-2012-4252


JSON object : View

Products Affected

mysqldumper

  • mysqldumper
CWE
CWE-352

Cross-Site Request Forgery (CSRF)