Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Name CVE-2004-1967 First vendor Publication 2004-04-25
Vendor Cve Last vendor Modification 2024-02-08

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overall CVSS Score 8.8
Base Score 8.8 Environmental Score 8.8
impact SubScore 5.9 Temporal Score 8.8
Exploitabality Sub Score 2.8
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Cross-site request forgery (CSRF) vulnerabilities in (1) cp_forums.php, (2) cp_usergroup.php, (3) cp_ipbans.php, (4) myhome.php, (5) post.php, or (6) moderator.php in Open Bulletin Board (OpenBB) 1.0.6 and earlier allow remote attackers to execute arbitrary code by including the code in an image tag or a link.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1967

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-62 Cross Site Request Forgery (aka Session Riding)
CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
5657 OpenBB [IMG] Tag Arbitrary BB Command Execution

OpenBB contains a flaw that allows remote attackers to execute arbitrary OpenBB commands. The issue is due to the bulletin board not properly utilizing session IDs or authentication tokens. If an attacker supplies a malicious command embedded in an image tag which is posted or sent as a private message, the command will be executed without confirmation by the administrator.

Sources (Detail)

Source Url
BUGTRAQ http://marc.info/?l=bugtraq&m=108301983206107&w=2
SECTRACK http://securitytracker.com/id?1009935
SECUNIA http://secunia.com/advisories/11481
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/15967

Alert History

If you want to see full details history, please login or register.
Date Informations
2024-02-09 00:28:16
  • Multiple Updates
2021-05-04 12:02:34
  • Multiple Updates
2021-04-22 01:02:46
  • Multiple Updates
2020-05-23 00:16:06
  • Multiple Updates
2017-07-11 12:01:41
  • Multiple Updates
2016-10-18 12:01:30
  • Multiple Updates
2016-04-26 13:04:40
  • Multiple Updates
2013-05-11 11:47:12
  • Multiple Updates