Executive Summary
Summary | |
---|---|
Title | New tdiary packages fix Cross Site Request Forgery |
Informations | |||
---|---|---|---|
Name | DSA-808 | First vendor Publication | 2005-09-12 |
Vendor | Debian | Last vendor Modification | 2005-09-12 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The tdiary Development Team has discovered a Cross-Site Request Forgery (CSRF) vulnerability in tdiary, a new generation weblog that can be exploited by remote attackers to alter the users information. The old stable distribution (woody) does not contain tdiary packages. For the stable distribution (sarge) this problem has been fixed in version 2.0.1-1sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.0.2-1. We recommend that you upgrade your tdiary packages. |
Original Source
Url : http://www.debian.org/security/2005/dsa-808 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 808-1 (tdiary) File : nvt/deb_808_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18604 | tDiary URL Activation CSRF tDiary contains a flaw that allows a Cross-Side Request Forgery (CSRF). This flaw exists because the application does not verify that requests to privileged URLs come from appropriate tDiary web pages. This could allow a user to create a malicious URL (within or outside the tDiary application) which if followed by an authenticated tDiary user, causes privileged actions to happen on behalf of the tDiary user or web server. This flaw can be used to delete tDiary entries, change tDiary configurations, and execute privileged commands on behalf of the web server. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-09-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-808.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:20 |
|