Vulnerability Details : CVE-2011-5298
Potential exploit
Multiple cross-site request forgery (CSRF) vulnerabilities in Argyle Social 2011-04-26 allow remote attackers to hijack the authentication of administrators for requests that (1) modify credentials via the role parameter to users/create/, (2) modify rules via the terms field in stream_filter_rule JSON data to settings-ajax/stream_filter_rules/create, or (3) modify efforts via the title field in effort JSON data to publish-ajax/efforts/create.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2011-5298
- cpe:2.3:a:viralheat:argyle_social:2011-04-26:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-5298
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-5298
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-5298
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5298
-
https://www.htbridge.com/advisory/HTB22978
Cross-site Request Forgery (CSRF) Vulnerabilities in Argyle Social - HTB22978 Security Advisory | ImmuniWebExploit
Jump to