Vulnerability Details : CVE-2016-9127
Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). The password recovery form in Revive Adserver is vulnerable to CSRF attacks. This vulnerability could be exploited to send a large number of password recovery emails to the registered users, especially in conjunction with a bug that caused recovery emails to be sent to all the users at once. Both issues have been fixed.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2016-9127
- cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9127
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9127
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-9127
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2016-9127
-
https://www.revive-adserver.com/security/revive-sa-2016-001/
Revive Adserver Security Advisory SA-2016-001Patch;Vendor Advisory
-
https://hackerone.com/reports/99452
Sign inPermissions Required
-
https://github.com/revive-adserver/revive-adserver/commit/3aaebcc765797d2c684e031f2836e0a69d6b7bc2
Fix h1 report 99452 · revive-adserver/revive-adserver@3aaebcc · GitHubIssue Tracking;Patch;Third Party Advisory
Jump to