Cross-site request forgery (CSRF) vulnerability in the Realtyna RPL (com_rpl) component before 8.9.5 for Joomla! allows remote attackers to hijack the authentication of administrators for requests that add a user via an add_user action to administrator/index.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://rpl.realtyna.com/change-logs/rpl7-changelog | Vendor Advisory |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/38528/ | Exploit Issue Tracking Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://rpl.realtyna.com/change-logs/rpl7-changelog | Vendor Advisory |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/38528/ | Exploit Issue Tracking Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/134067/Realtyna-RPL-8.9.2-CSRF-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry | |
References | () http://rpl.realtyna.com/change-logs/rpl7-changelog - Vendor Advisory | |
References | () http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5271.php - Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/38528/ - Exploit, Issue Tracking, Third Party Advisory, VDB Entry |
Information
Published : 2017-10-18 18:29
Updated : 2024-11-21 02:37
NVD link : CVE-2015-7715
Mitre link : CVE-2015-7715
CVE.ORG link : CVE-2015-7715
JSON object : View
Products Affected
realtyna
- realtyna_property_listing
CWE
CWE-352
Cross-Site Request Forgery (CSRF)