Vulnerability Details : CVE-2012-4853
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere Application Server 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger information disclosure.
Vulnerability category: Cross-site request forgery (CSRF)Information leak
Threat overview for CVE-2012-4853
Top countries where our scanners detected CVE-2012-4853
Top open port discovered on systems with this issue
9080
IPs affected by CVE-2012-4853 1,498
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-4853!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-4853
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 48 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4853
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-4853
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4853
-
http://www.securityfocus.com/bid/56458
IBM WebSphere Application Server CVE-2012-4853 Cross-Site Request Forgery Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79598
IBM WebSphere Application Server WASReqURL cross-site request forgery CVE-2012-4853 Vulnerability Report
-
http://www.ibm.com/support/docview.wss?uid=swg21614265
IBM Security Bulletin: Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.0.1Vendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg1PM62920
IBM notice: The page you requested cannot be displayed
Products affected by CVE-2012-4853
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*