Metronet Tag Manager version 1.2.7 contains a Cross ite Request Forgery (CSRF) vulnerability in Settings page /wp-admin/options-general.php?page=metronet-tag-manager that can result in allows anybody to do almost anything an admin can. This attack appear to be exploitable via Logged in user must follow a link. This vulnerability appears to have been fixed in 1.2.9.
References
Link | Resource |
---|---|
https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ | Exploit Third Party Advisory |
https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.dxw.com/advisories/csrf-metronet-tag-manager/ - Exploit, Third Party Advisory |
Information
Published : 2018-06-26 16:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000506
Mitre link : CVE-2018-1000506
CVE.ORG link : CVE-2018-1000506
JSON object : View
Products Affected
mediaron
- metronet_tag_manager
CWE
CWE-352
Cross-Site Request Forgery (CSRF)