BigTree CMS through 4.2.17 relies on a substring check for CSRF protection, which allows remote attackers to bypass this check by placing the required admin/developer/ URI within a query string in an HTTP Referer header. This was found in core/admin/modules/developer/_header.php and patched in core/inc/bigtree/admin.php on 2017-04-14.
References
| Link | Resource |
|---|---|
| https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 | Issue Tracking Patch Third Party Advisory |
| https://www.cdxy.me/?p=765 | Exploit Third Party Advisory |
| https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 | Issue Tracking Patch Third Party Advisory |
| https://www.cdxy.me/?p=765 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/bigtreecms/BigTree-CMS/commit/7761481ac40d83ac29fef42bc6b3c07c86694b56 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://www.cdxy.me/?p=765 - Exploit, Third Party Advisory |
Information
Published : 2017-04-15 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-7881
Mitre link : CVE-2017-7881
CVE.ORG link : CVE-2017-7881
JSON object : View
Products Affected
bigtreecms
- bigtree_cms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
