Vulnerability Details : CVE-2013-2653
security/MemberLoginForm.php in SilverStripe 3.0.3 supports login using a GET request, which makes it easier for remote attackers to conduct phishing attacks without detection by the victim.
Vulnerability category: Input validation
Products affected by CVE-2013-2653
- cpe:2.3:a:silverstripe:silverstripe:3.0.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2653
1.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2013-2653
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2653
-
https://github.com/chillu/silverstripe-framework/commit/3e88c98ca513880e2b43ed7f27ade17fef5d9170
API Restrict MemberLoginForm to POST requests for increased security · chillu/silverstripe-framework@3e88c98 · GitHubPatch
-
http://seclists.org/bugtraq/2013/Aug/12
Bugtraq: SilverStripe(R) Information Exposure Through Query Strings in GET Request (CWE-598)Exploit
Jump to