BigTree CMS through 4.2.17 relies on a substring check for CSRF protection, which allows remote attackers to bypass this check by placing the required admin/developer/ URI within a query string in an HTTP Referer header. This was found in core/admin/modules/developer/_header.php and patched in core/inc/bigtree/admin.php on 2017-04-14.
References
Link | Resource |
---|---|
https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 | Issue Tracking Patch Third Party Advisory |
https://www.cdxy.me/?p=765 | Exploit Third Party Advisory |
https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 | Issue Tracking Patch Third Party Advisory |
https://www.cdxy.me/?p=765 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.cdxy.me/?p=765 - Exploit, Third Party Advisory |
Information
Published : 2017-04-15 16:59
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7881
Mitre link : CVE-2017-7881
CVE.ORG link : CVE-2017-7881
JSON object : View
Products Affected
bigtreecms
- bigtree_cms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)