Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). The password recovery form in Revive Adserver is vulnerable to CSRF attacks. This vulnerability could be exploited to send a large number of password recovery emails to the registered users, especially in conjunction with a bug that caused recovery emails to be sent to all the users at once. Both issues have been fixed.
References
Link | Resource |
---|---|
https://github.com/revive-adserver/revive-adserver/commit/3aaebcc765797d2c684e031f2836e0a69d6b7bc2 | Issue Tracking Patch Third Party Advisory |
https://hackerone.com/reports/99452 | Permissions Required |
https://www.revive-adserver.com/security/revive-sa-2016-001/ | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hackerone
Published: 2017-03-28T02:46:00
Updated: 2017-03-28T02:57:01
Reserved: 2016-10-31T00:00:00
Link: CVE-2016-9127
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-28T02:59:00.450
Modified: 2019-10-09T23:20:19.117
Link: CVE-2016-9127
JSON object: View
Redhat Information
No data.
CWE