A Cross Site Request Forgery (CSRF) issue in Server Console in CloverDX through 5.9.0 allows remote attackers to execute any action as the logged-in user (including script execution). The issue is resolved in CloverDX 5.10, CloverDX 5.9.1, CloverDX 5.8.2, and CloverDX 5.7.1.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163697/CloverDX-5.9.0-Code-Execution-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://support.cloverdx.com/releases/ | Release Notes Vendor Advisory |
https://support1.cloverdx.com/hc/en-us/articles/360021006520 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-09T14:23:17
Updated: 2021-07-29T15:06:12
Reserved: 2021-04-02T00:00:00
Link: CVE-2021-29995
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-09T15:15:08.503
Modified: 2022-05-25T20:42:04.153
Link: CVE-2021-29995
JSON object: View
Redhat Information
No data.
CWE