Vulnerability Details : CVE-2015-6966
Potential exploit
Multiple cross-site request forgery (CSRF) vulnerabilities in Nibbleblog before 4.0.5 allow remote attackers to hijack the authentication of administrators for requests that (1) create a post via a new_simple action to admin.php or (2) conduct cross-site scripting (XSS) attacks via the content parameter in a new_simple action to admin.php.
Vulnerability category: Cross site scripting (XSS)Cross-site request forgery (CSRF)
Products affected by CVE-2015-6966
- cpe:2.3:a:nibbleblog:nibbleblog:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6966
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6966
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2015-6966
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6966
-
http://blog.nibbleblog.com/post/nibbleblog-v4-0-5/
Patch;Vendor Advisory
-
http://seclists.org/fulldisclosure/2015/Sep/4
Full Disclosure: NibbleBlog 4.0.3 - CSRF - Not fixedExploit
-
http://blog.curesec.com/article/blog/NibbleBlog-403-CSRF-46.html
NibbleBlog 4.0.3: CSRF - CureblogExploit
Jump to