Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). A number of scripts in Revive Adserver's user interface are vulnerable to CSRF attacks: `www/admin/banner-acl.php`, `www/admin/banner-activate.php`, `www/admin/banner-advanced.php`, `www/admin/banner-modify.php`, `www/admin/banner-swf.php`, `www/admin/banner-zone.php`, `www/admin/tracker-modify.php`.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/83964 | |
https://github.com/revive-adserver/revive-adserver/commit/65a9c8119b4bc7493fd957e1a8d6f6f731298b45 | Issue Tracking Patch Third Party Advisory |
https://hackerone.com/reports/97123 | Permissions Required |
https://www.revive-adserver.com/security/revive-sa-2016-001/ | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hackerone
Published: 2017-03-28T02:46:00
Updated: 2017-03-29T09:57:01
Reserved: 2016-11-19T00:00:00
Link: CVE-2016-9455
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-28T02:59:00.620
Modified: 2017-03-30T01:59:01.487
Link: CVE-2016-9455
JSON object: View
Redhat Information
No data.
CWE