Vulnerability Details : CVE-2013-7107
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2013-7107
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-7107
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-7107
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7107
-
https://dev.icinga.org/issues/5346
Vendor Advisory
-
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Vendor Advisory
-
https://dev.icinga.org/issues/5250
Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2013/12/16/4
oss-security - Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)
-
http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html
openSUSE-SU-2014:0269-1: moderate: update for icinga
Products affected by CVE-2013-7107
- cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*