CVE-2013-5954
Published Apr 25, 2014
Last updated 6 years ago
Overview
- Description
- Multiple cross-site request forgery (CSRF) vulnerabilities in OpenX 2.8.11 and earlier allow remote attackers to hijack the authentication of administrators for requests that delete (1) users via admin/agency-user-unlink.php, (2) advertisers via admin/advertiser-delete.php, (3) banners via admin/banner-delete.php, (4) campaigns via admin/campaign-delete.php, (5) channels via admin/channel-delete.php, (6) affiliate websites via admin/affiliate-delete.php, or (7) zones via admin/zone-delete.php.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BC4AD4-6377-4113-B74C-77FEAE01EF5D", "versionEndIncluding": "3.0.4" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openx:openx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83CD7FFD-B76C-4A3D-BAE5-B675D2E67600", "versionEndIncluding": "2.8.11" }, { "criteria": "cpe:2.3:a:openx:openx:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F957F8C-88C3-4F0C-85A8-27AA58847DF6" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A00DC86E-06BB-458E-8E99-8DFD77607FE0" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9DAE4E2-081D-44BE-89F5-204C0659B038" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F8581E3-9185-45A6-9BCA-B77A9D3D7F8A" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D9EE001-25C5-466C-BF2B-C0B255E10886" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBDAB70-27FA-4D81-A06E-5E394828513C" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DCEECC7-1A82-4994-82BE-1E7F8E15068A" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0302A92C-9659-4F68-A97B-6EBE08D86B54" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C60BF997-9E26-4B7A-8243-2CCDC74CAAC4" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06D09511-33F0-4759-A379-6A9C1B2ADFFF" }, { "criteria": "cpe:2.3:a:openx:openx:2.8.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E7A24FA-D282-402B-9F80-ECA190406EE4" } ], "operator": "OR" } ] } ]