e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used=1&id= for changing the title of an arbitrary page.
References
Link | Resource |
---|---|
https://github.com/himanshurahi/e107_2.1.9_CSRF_POC | Exploit Technical Description Third Party Advisory |
https://github.com/himanshurahi/e107_2.1.9_CSRF_POC | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/himanshurahi/e107_2.1.9_CSRF_POCĀ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-09-26 21:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-17081
Mitre link : CVE-2018-17081
CVE.ORG link : CVE-2018-17081
JSON object : View
Products Affected
e107
- e107
CWE
CWE-352
Cross-Site Request Forgery (CSRF)