Executive Summary
Summary | |
---|---|
Title | extplorer security update |
Informations | |||
---|---|---|---|
Name | DSA-2510 | First vendor Publication | 2012-07-12 |
Vendor | Debian | Last vendor Modification | 2012-07-12 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
John Leitch has discovered a vulnerability in eXtplorer, a very feature rich web server file manager, which can be exploited by malicious people to conduct cross-site request forgery attacks. The vulnerability allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited for example, to create an administrative user account by tricking an logged administrator to visiting an attacker-defined web link. For the stable distribution (squeeze), this problem has been fixed in version 2.1.0b6+dfsg.2-1+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 2.1.0b6+dfsg.3-3. For the unstable distribution (sid), this problem has been fixed in version 2.1.0b6+dfsg.3-3. We recommend that you upgrade your extplorer packages. |
Original Source
Url : http://www.debian.org/security/2012/dsa-2510 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19783 | |||
Oval ID: | oval:org.mitre.oval:def:19783 | ||
Title: | DSA-2510-1 extplorer - Cross-site request forgery | ||
Description: | John Leitch has discovered a vulnerability in eXtplorer, a very feature rich web server file manager, which can be exploited by malicious people to conduct cross-site request forgery attacks. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2510-1 CVE-2012-3362 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | extplorer |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2012-08-10 | Name : Debian Security Advisory DSA 2510-1 (extplorer) File : nvt/deb_2510_1.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-07-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2510.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:31:13 |
|