Vulnerability Details : CVE-2010-2039
Cross-site request forgery (CSRF) vulnerability in gpEasy CMS 1.6.2, 1.6.1, and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative users via an Admin_Users action to index.php. NOTE: some of these details are obtained from third party information.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2010-2039
Probability of exploitation activity in the next 30 days: 1.50%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2039
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2010-2039
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2039
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/58214
gpEasy CMS admin interface cross-site request forgery CVE-2010-2039 Vulnerability Report
-
http://www.vupen.com/english/advisories/2010/1030
Webmail | OVH- OVHVendor Advisory
-
http://packetstormsecurity.org/1004-exploits/gpeasy-xsrf.txt
Files ≈ Packet StormExploit
-
http://www.exploit-db.com/exploits/12441
gpEasy 1.6.1 - Cross-Site Request Forgery (Add Admin) - PHP webapps ExploitExploit
Products affected by CVE-2010-2039
- cpe:2.3:a:gpeasy:gpeasy_cms:*:*:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:rc3:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:rc4:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.5:rc2:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:rc5:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.5:rc4:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.5:rc3:*:*:*:*:*:*
- cpe:2.3:a:gpeasy:gpeasy_cms:1.6:rc1:*:*:*:*:*:*