CVE-2012-2275
Published Sep 15, 2012
Last updated 7 years ago
Overview
- Description
- Multiple cross-site request forgery (CSRF) vulnerabilities in TestLink 1.9.3 and earlier allow remote attackers to hijack the authentication of users for requests that add, delete, or modify sensitive information, as demonstrated by changing the administrator's email via an editUser action to lib/usermanagement/userInfo.php.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:teamst:testlink:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2C93C8A-BD77-4B1E-895B-DF268390F3C8", "versionEndIncluding": "1.9.3" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59E20AB1-CE62-4F45-AF92-C31DB56846E7" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFC3D840-86DA-45A8-AAB6-204343B6EE8E" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E88B7B2-FA29-41EF-A2FB-4B5EF3889435" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B667E47-CFD5-4125-844D-F79505FC95C4" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFFAFFD7-26B8-4ADF-B134-F71268EC9FCD" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E136AD4F-552C-4414-A8B4-0CEC91480671" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EE00F0B-F58E-4AB8-B66E-A2BD4CF03EA2" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4434FB82-6BA6-4335-8FF0-26738318FB41" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5FEACF5-86A6-4E8C-896E-436E2FF2948F" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "956B741E-6FCC-46B2-8164-3322F6418CAA" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38156CE-2A5E-4308-BE28-DCE78F9C2147" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5158177-EFF7-47B1-A159-59283B814209" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "116616D2-2F87-41A3-880E-7C1C1BC460FB" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70877F5A-C793-4D3F-8078-185C8DD20B73" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC91095-A80B-4193-9414-A94DD3D1800B" }, { "criteria": "cpe:2.3:a:teamst:testlink:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AE56DCB-B3CB-4FA8-8670-5139F858BD82" } ], "operator": "OR" } ] } ]