Vulnerability identifier: #VU13394
Vulnerability risk: Low
CVSSv3.1: 5.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-352
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Micro Focus Universal Configuration Management Database Browser
Web applications /
Remote management & hosting panels
Vendor: Micro Focus
Description
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists in Micro Focus Universal Configuration Management Database (UCMDB) Browser due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim into loading a specially crafted HTML page or URL, perform CSRF attack, take actions on the target system acting as the target authenticated user and conduct java object deserialization attacks.
Mitigation
Micro Focus has made the following mitigation information available to resolve the vulnerability for the impacted versions of UCMDB Browser:
https://softwaresupport.softwaregrp.com/km/KM03178826?lang=en&cc=us&hpappid=206728_SSO_PRO
Vulnerable software versions
Micro Focus Universal Configuration Management Database Browser: 4.10 - 4.15.1
External links
http://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03180066
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.