An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.
References
Link | Resource |
---|---|
https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189 | Patch |
https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/ | Exploit Patch Third Party Advisory |
https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=commit&h=d6701289ae55de900929ff0f66313fa9771a198d | Issue Tracking Patch Vendor Advisory |
https://tuleap.net/plugins/tracker/?aid=11217 | Patch Vendor Advisory |
https://twitter.com/Mustafaran/status/970745812887199744 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-03-01 23:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-7634
Mitre link : CVE-2018-7634
CVE.ORG link : CVE-2018-7634
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-352
Cross-Site Request Forgery (CSRF)