Roland Gruber Softwareentwicklung LDAP Account Manager before 6.3 places a CSRF token in the sec_token parameter of a URI, which makes it easier for remote attackers to defeat a CSRF protection mechanism by leveraging logging.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Mar/45 | Exploit Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4165 | Third Party Advisory |
http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Mar/45 | Exploit Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4165 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2018/Mar/45 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4165 - Third Party Advisory |
Information
Published : 2018-03-27 16:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8764
Mitre link : CVE-2018-8764
CVE.ORG link : CVE-2018-8764
JSON object : View
Products Affected
ldap-account-manager
- ldap_account_manager
debian
- debian_linux
CWE
CWE-352
Cross-Site Request Forgery (CSRF)