Vulnerability Name: | CVE-2018-8764 (CCN-140687) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-03-21 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-03-21 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-04-20 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Roland Gruber Softwareentwicklung LDAP Account Manager before 6.3 places a CSRF token in the sec_token parameter of a URI, which makes it easier for remote attackers to defeat a CSRF protection mechanism by leveraging logging. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-352 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-8764 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/146858/LDAP-Account-Manager-6.2-Cross-Site-Scripting.html Source: CCN Type: Full-Disclosure Mailing List, Wed, 21 Mar 2018 12:19:56 +0100 LDAP Account Manager (6.2) CVE-2018-8763, CVE-2018-8764 Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20180322 LDAP Account Manager (6.2) CVE-2018-8763, CVE-2018-8764 Source: XF Type: UNKNOWN ldap-accountmanager-cve20188764-csrf(140687) Source: CCN Type: Packet Storm Security [03-22-2018] LDAP Account Manager 6.2 Cross Site Scripting Source: DEBIAN Type: Third Party Advisory DSA-4165 Source: CCN Type: LDAP Account Manager Web site LDAP Account Manager: Easy LDAP management Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-8764 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |