CVE-2013-3539
Vulnerability from cvelistv5
Published
2013-10-01 19:00
Modified
2024-09-16 16:54
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130612 Security Analysis of IP video surveillance cameras",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130612 Security Analysis of IP video surveillance cameras",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3539",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130612 Security Analysis of IP video surveillance cameras",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2013/Jun/84"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3539",
    "datePublished": "2013-10-01T19:00:00Z",
    "dateReserved": "2013-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T16:54:12.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-3539\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-10-01T19:55:03.507\",\"lastModified\":\"2013-10-02T19:26:03.280\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site request forgery (CSRF) vulnerability in the command/user.cgi in Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad Cross-site request forgery (CSRF) en command/user.cgi de Sony SNC CH140, SNC CH180, SNC CH240, SNC CH280, SNC DH140, SNC DH140T, SNC DH180, SNC DH240, SNC DH240T, SNC DH280, y posiblemente otros mod\u00e9los de cm\u00e1mara permiten a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para peticiones de a\u00f1adir usuario.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:ovislink:airlive_wl2600cam:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047A5975-DB64-4A14-95E2-DE4C8767380C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_ch140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F7EE6A1-1C2D-46AB-A2E5-BA337FEE5944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_ch180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886547A6-964B-4317-B87E-41E4A21E00F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_ch240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95967F17-022B-46AC-A9EA-F28029349B2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_ch280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71CFC6B-07C7-42A4-A670-04E9BC2C7823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DA6E7C-4FCE-4E3C-A8E9-9CE8F95382D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh140t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A32A946-AABA-4ED4-8937-D3529EA238D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh180:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBE3056-8EC1-48E9-876E-5C08D545D1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F047FD-AA62-4B4E-B1F9-1572024FE115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh240t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA03E7A7-30C7-4260-9DAE-01356A162654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:sony:snc_dh280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6859F4-615A-4623-A592-EACE0E4FE1CB\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2013/Jun/84\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.