Multiple cross-site request forgery (CSRF) vulnerabilities in ZPanel 10.0.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) create new FTP users via a CreateFTP action in the ftp_management module to the default URI, (2) conduct cross-site scripting (XSS) attacks via the inFullname parameter in an UpdateAccountSettings action in the my_account module to zpanel/, or (3) conduct SQL injection attacks via the inEmailAddress parameter in an UpdateClient action in the manage_clients module to the default URI.
References
Configurations
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/87140 - | |
References | () http://packetstormsecurity.com/files/117894/ZPanel-10.0.1-XSS-CSRF-SQL-Injection.html - Exploit | |
References | () http://secunia.com/advisories/51172 - | |
References | () http://www.exploit-db.com/exploits/22490 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79838 - |
Information
Published : 2014-08-14 14:55
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5683
Mitre link : CVE-2012-5683
CVE.ORG link : CVE-2012-5683
JSON object : View
Products Affected
zpanelcp
- zpanel
CWE
CWE-352
Cross-Site Request Forgery (CSRF)