CVE-2015-7364

The HTML_Quickform library, as used in Revive Adserver before 3.2.2, allows remote attackers to bypass the CSRF protection mechanism via an empty token.
Configurations

Configuration 1 (hide)

cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html - () http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html -
References () http://seclists.org/fulldisclosure/2015/Oct/32 - () http://seclists.org/fulldisclosure/2015/Oct/32 -
References () http://www.revive-adserver.com/security/revive-sa-2015-001 - Vendor Advisory () http://www.revive-adserver.com/security/revive-sa-2015-001 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/536633/100/0/threaded - () http://www.securityfocus.com/archive/1/536633/100/0/threaded -
References () https://github.com/revive-adserver/revive-adserver/commit/288f81cc - Patch () https://github.com/revive-adserver/revive-adserver/commit/288f81cc - Patch

Information

Published : 2015-10-14 19:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7364

Mitre link : CVE-2015-7364

CVE.ORG link : CVE-2015-7364


JSON object : View

Products Affected

revive-adserver

  • revive_adserver
CWE
CWE-352

Cross-Site Request Forgery (CSRF)