Multiple cross-site request forgery (CSRF) vulnerabilities in includes/campaignmonitor_lists.admin.inc in the Campaign Monitor module 7.x-1.0 for Drupal allow remote attackers to hijack the authentication of users for requests that (1) enable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/enable or (2) disable list subscriptions via a request to admin/config/services/campaignmonitor/lists/%/disable. NOTE: this refers to an issue in an independently developed Drupal module, and NOT an issue in the Campaign Monitor software itself (described on the campaignmonitor.com web site).
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/04/25/6 - | |
References | () http://www.securityfocus.com/bid/72953 - | |
References | () https://www.drupal.org/node/2445971 - Patch, Vendor Advisory | |
References | () https://www.drupal.org/node/2449747 - | |
References | () https://www.drupal.org/node/2452569 - Patch |
Information
Published : 2015-06-15 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4364
Mitre link : CVE-2015-4364
CVE.ORG link : CVE-2015-4364
JSON object : View
Products Affected
campaign_monitor_project
- campaign_monitor
CWE
CWE-352
Cross-Site Request Forgery (CSRF)