Vulnerability Details : CVE-2015-5397
Cross-site request forgery (CSRF) vulnerability in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.2 allows remote attackers to hijack the authentication of unspecified victims for requests that upload code via unknown vectors.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2015-5397
Probability of exploitation activity in the next 30 days: 0.21%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 58 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-5397
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2015-5397
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5397
-
http://developer.joomla.org/security-centre/618-20150602-core-remote-code-execution.html
[20150602] - Core - CSRF ProtectionVendor Advisory
-
http://www.securitytracker.com/id/1032796
Joomla! Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker
-
http://www.securityfocus.com/bid/76495
Joomla! CVE-2015-5397 Cross Site Request Forgery Vulnerability
Products affected by CVE-2015-5397
- cpe:2.3:a:joomla:joomla\!:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.4.0:beta3:*:*:*:*:*:*