![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.806508 |
Categoría: | Web application abuses |
Título: | Revive Adserver < 3.2.2 Multiple Vulnerabilities (REVIVE-SA-2015-001) |
Resumen: | Revive Adserver is prone to multiple vulnerabilities. |
Descripción: | Summary: Revive Adserver is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - Some plugin actions (e.g. enabling, disabling) could be performed via GET without any CSRF protection mechanism. - 'account-user-*.php' scripts not checking the CSRF token sent via POST request. - Insufficient restriction on accessing cached copies of pages visited in Revive Adserver's admin UI. - Default Flash cross-domain policy (crossdomain.xml) does not restrict access cross domain access - Insufficient sanitization of user-supplied input via 'id' and 'data-file' parameters in the 'open-flash-chart.swf' script. - 'run-mpe.php' script used by the admin UI lacks proper authentication and access control. - Insufficient sanitization of user-supplied input via 'layerstyle' parameter in the 'al.php' script. - 'magic-macros' feature in Revive Adserver does not sanitize user supplied input via different GET parameters. Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site, to disrupt service, to corrupt information, to conduct cross domain attacks, to cause a denial of service, include and execute arbitrary local files and to perform some unspecified actions and allow local attackers to obtain sensitive information. Affected Software/OS: Revive Adserver versions before 3.2.2. Solution: Upgrade version 3.2.2 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-7364 Bugtraq: 20151007 [REVIVE-SA-2015-001] Revive Adserver - Multiple vulnerabilities (Google Search) http://www.securityfocus.com/archive/1/536633/100/0/threaded http://seclists.org/fulldisclosure/2015/Oct/32 http://packetstormsecurity.com/files/133893/Revive-Adserver-3.2.1-CSRF-XSS-Local-File-Inclusion.html Common Vulnerability Exposure (CVE) ID: CVE-2015-7365 Common Vulnerability Exposure (CVE) ID: CVE-2015-7366 Common Vulnerability Exposure (CVE) ID: CVE-2015-7367 Common Vulnerability Exposure (CVE) ID: CVE-2015-7368 Common Vulnerability Exposure (CVE) ID: CVE-2015-7369 Common Vulnerability Exposure (CVE) ID: CVE-2015-7370 BugTraq ID: 91497 http://www.securityfocus.com/bid/91497 http://www.securitytracker.com/id/1036193 Common Vulnerability Exposure (CVE) ID: CVE-2015-7371 Common Vulnerability Exposure (CVE) ID: CVE-2015-7372 Common Vulnerability Exposure (CVE) ID: CVE-2015-7373 |
Copyright | Copyright (C) 2015 Greenbone Networks GmbH |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |