#VU43512 Cross-site request forgery in TestLink - CVE-2012-2275
Published: September 15, 2012 / Updated: August 11, 2020
Vulnerability identifier: #VU43512
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2012-2275
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
TestLink
TestLink
Software vendor:
testlink.org
testlink.org
Description
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and lib/usermanagement/userInfo.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- http://archives.neohapsis.com/archives/bugtraq/2012-09/0023.html
- http://gitorious.org/testlink-ga/testlink-code/commit/252788c2373e73173172ada9af661e0721599891
- http://gitorious.org/testlink-ga/testlink-code/commit/2d4ac941314f8bda80e265c9de8bacf17d1cd3e6
- http://gitorious.org/testlink-ga/testlink-code/commit/c8751a3c9ad8970b49d1bf882203efacd10af087
- http://packetstormsecurity.org/files/116275/TestLink-1.9.3-Cross-Site-Request-Forgery.html
- http://www.exploit-db.com/exploits/21135
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78306
- https://www.htbridge.com/advisory/HTB23088