CVE-2010-0713
Zenoss 2.3.3 - Multiple Cross-Site Request Forgery Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss 2.3.3, and other versions before 2.5, allow remote attackers to hijack the authentication of an administrator for (1) requests that reset user passwords via zport/dmd/ZenUsers/admin, and (2) requests that change user commands, which allows for remote execution of system commands via zport/dmd/userCommands/.
Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en Zenoss v2.3.3, y otras versiones anteriores a v2.5, permite a atacantes remotos secuestrar la autenticación de las peticiones de administradores para (1) peticiones que reinicializan la contraseña de los usuarios a través de zport/dmd/ZenUsers/admin, y (2) peticiones que modifican comandos de usuario, lo que permite ejecuciones de comandos del sistema mediante zport/dmd/userCommands/
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-01-18 First Exploit
- 2010-02-26 CVE Reserved
- 2010-02-26 CVE Published
- 2024-05-31 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://osvdb.org/61805 | Vdb Entry | |
http://www.ngenuity.org/wordpress/2010/01/14/ngenuity-2010-002-zenoss-multiple-admin-csrf | X_refsource_misc | |
http://www.securityfocus.com/archive/1/508982/100/0/threaded | Mailing List |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33536 | 2010-01-18 | |
http://www.securityfocus.com/bid/37843 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/38195 | 2018-10-10 | |
http://www.zenoss.com/news/SQL-Injection-and-Cross-Site-Forgery-in-Zenoss-Core-Corrected.html | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zenoss Search vendor "Zenoss" | Zenoss Search vendor "Zenoss" for product "Zenoss" | <= 2.4.5 Search vendor "Zenoss" for product "Zenoss" and version " <= 2.4.5" | - |
Affected
| ||||||
Zenoss Search vendor "Zenoss" | Zenoss Search vendor "Zenoss" for product "Zenoss" | 2.3.0 Search vendor "Zenoss" for product "Zenoss" and version "2.3.0" | - |
Affected
| ||||||
Zenoss Search vendor "Zenoss" | Zenoss Search vendor "Zenoss" for product "Zenoss" | 2.3.3 Search vendor "Zenoss" for product "Zenoss" and version "2.3.3" | - |
Affected
| ||||||
Zenoss Search vendor "Zenoss" | Zenoss Search vendor "Zenoss" for product "Zenoss" | 2.4.0 Search vendor "Zenoss" for product "Zenoss" and version "2.4.0" | - |
Affected
| ||||||
Zenoss Search vendor "Zenoss" | Zenoss Search vendor "Zenoss" for product "Zenoss" | 2.4.2 Search vendor "Zenoss" for product "Zenoss" and version "2.4.2" | - |
Affected
|