CVE-2018-7634 (GCVE-0-2018-7634)
Vulnerability from cvelistv5
Published
2018-03-01 22:00
Modified
2024-08-05 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:05.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-05T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/", "refsource": "MISC", "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "name": "https://tuleap.net/plugins/tracker/?aid=11217", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "name": "https://twitter.com/Mustafaran/status/970745812887199744", "refsource": "MISC", "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "name": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7634", "datePublished": "2018-03-01T22:00:00", "dateReserved": "2018-03-01T00:00:00", "dateUpdated": "2024-08-05T06:31:05.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-7634\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-01T23:29:00.607\",\"lastModified\":\"2024-11-21T04:12:26.653\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Enalean Tuleap 9.17. La falta de mitigaci\u00f3n de ataques Cross-Site Request Forgery (CSRF) al cambiar una direcci\u00f3n de email posibilita que los atacantes puedan abusar de la funcionalidad. Mediante la realizaci\u00f3n de un ataque de CSRF, un atacante podr\u00eda hacer que una v\u00edctima cambie su direcci\u00f3n de email registrada en la aplicaci\u00f3n, lo que conduce a la toma de control de la cuenta.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:enalean:tuleap:9.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D788FEE9-7E6B-48C7-A867-D29BDCA98ADF\"}]}]}],\"references\":[{\"url\":\"https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tuleap.net/plugins/tracker/?aid=11217\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://twitter.com/Mustafaran/status/970745812887199744\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tuleap.net/plugins/tracker/?aid=11217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://twitter.com/Mustafaran/status/970745812887199744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…