[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAF1aazBQLxYu4J7O9qgZROswJ8vCb1=cRUy_RZ=yAA14niSeeA@mail.gmail.com>
Date: Sun, 24 Jun 2012 13:03:58 -0400
From: Dave <snoopdave@...il.com>
To: user <user@...ler.apache.org>, dev@...ler.apache.org, security@...che.org,
full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: CVE-2012-2380: Apache Roller
Cross-Site-Resource-Forgery (XSRF) vulnerability
Severity: important
Vendor: The Apache Software Foundation
Versions Affected:
Roller 4.0.0 to Roller 4.0.1
Roller 5.0
The unsupported Roller 3.1 release is also affected
Description:
HTTP POST interfaces in the Roller admin/editor console were not
protected from CSRF attacks. This issue has been fixed by requiring a
valid per user and per session "salt" value in all HTTP POST requests.
Mitigation
Roller 4.0 and 4.0.1 users should upgrade to Roller 5.0.1
Roller 5.0 users should upgrade to Roller 5.0.1
Roller 3.1 users should upgrade to Roller 5.0.1
Credit:
This issue was discovered by Jun Zhu, PhD student, University of North
Carolina, Charlotte
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists