An issue was discovered in tools/pass-change/result.php in phpIPAM 1.4. CSRF can be used to change the password of any user/admin, to escalate privileges, and to gain access to more data and functionality. This issue exists due to the lack of a requirement to provide the old password, and the lack of security tokens.
References
Link | Resource |
---|---|
https://pastebin.com/ZPECbgZb | Exploit Third Party Advisory |
https://phpipam.net/news/phpipam-v1-5-released/ | Broken Link Vendor Advisory |
https://pastebin.com/ZPECbgZb | Exploit Third Party Advisory |
https://phpipam.net/news/phpipam-v1-5-released/ | Broken Link Vendor Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://pastebin.com/ZPECbgZb - Exploit, Third Party Advisory | |
References | () https://phpipam.net/news/phpipam-v1-5-released/ - Broken Link, Vendor Advisory |
Information
Published : 2020-03-04 17:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7988
Mitre link : CVE-2020-7988
CVE.ORG link : CVE-2020-7988
JSON object : View
Products Affected
phpipam
- phpipam
CWE
CWE-352
Cross-Site Request Forgery (CSRF)