Vulnerability Details : CVE-2008-2071
Multiple cross-site request forgery (CSRF) vulnerabilities in the WHM interface 11.15.0 for cPanel 11.18 before 11.18.4 and 11.22 before 11.22.3 allow remote attackers to perform unauthorized actions as cPanel administrators via requests to cpanel/whm/webmail and other unspecified vectors.
Vulnerability category: Cross-site request forgery (CSRF)
Threat overview for CVE-2008-2071
Top countries where our scanners detected CVE-2008-2071
Top open port discovered on systems with this issue
21
IPs affected by CVE-2008-2071 1
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-2071!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-2071
Probability of exploitation activity in the next 30 days: 0.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 57 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-2071
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-2071
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2071
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062197.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42306
- http://www.securityfocus.com/archive/1/491864/100/0/threaded
- http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2
- http://www.vupen.com/english/advisories/2008/1522/references
- http://www.securityfocus.com/bid/29125
- http://securityreason.com/securityalert/3866
Products affected by CVE-2008-2071
- cpe:2.3:a:cpanel:cpanel:11.18.3:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.18:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.22.2:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.18.2:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.22:*:*:*:*:*:*:*
- cpe:2.3:a:cpanel:cpanel:11.22.1:*:*:*:*:*:*:*