gsd-2017-5657
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-5657", "description": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).", "id": "GSD-2017-5657" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-5657" ], "details": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights).", "id": "GSD-2017-5657", "modified": "2023-12-13T01:21:13.748796Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5657", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Archiva", "version": { "version_data": [ { "version_value": "1.x" }, { "version_value": "2.0.0, 2.0.1" }, { "version_value": "2.1.0, 2.1.1" }, { "version_value": "2.2.0, 2.2.1, 2.2.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Apache Archiva CSRF vulnerabilities for various REST endpoints" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2017-5657", "refsource": "CONFIRM", "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.2.1]", "affected_versions": "All versions up to 2.2.1", "cvss_v2": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-352", "CWE-937" ], "date": "2019-04-16", "description": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session.", "fixed_versions": [ "2.2.3" ], "identifier": "CVE-2017-5657", "identifiers": [ "CVE-2017-5657" ], "not_impacted": "All versions after 2.2.1", "package_slug": "maven/org.apache.archiva/archiva-webapp", "pubdate": "2017-05-22", "solution": "Upgrade to version 2.2.3 or above.", "title": "Cross-Site Request Forgery (CSRF)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2017-5657", "http://archiva.apache.org/security.html#CVE-2017-5657", "http://www.securityfocus.com/bid/98570" ], "uuid": "791b05f5-b4fa-498d-b9c3-8d5435f0a4e8" }, { "affected_range": "(,2.2.1]", "affected_versions": "All versions up to 2.2.1", "cvss_v2": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-352", "CWE-937" ], "date": "2019-04-16", "description": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session.", "fixed_versions": [ "2.2.3" ], "identifier": "CVE-2017-5657", "identifiers": [ "CVE-2017-5657" ], "not_impacted": "All versions after 2.2.1", "package_slug": "maven/org.apache.archiva/archiva", "pubdate": "2017-05-22", "solution": "Upgrade to version 2.2.3 or above.", "title": "Cross-Site Request Forgery (CSRF)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2017-5657", "http://archiva.apache.org/security.html#CVE-2017-5657", "http://www.securityfocus.com/bid/98570" ], "uuid": "4c66b881-ec6b-4988-bf7d-3579af48c072" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5657" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Several REST service endpoints of Apache Archiva are not protected against Cross Site Request Forgery (CSRF) attacks. A malicious site opened in the same browser as the archiva site, may send an HTML response that performs arbitrary actions on archiva services, with the same rights as the active archiva session (e.g. administrator rights)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "http://archiva.apache.org/security.html#CVE-2017-5657", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archiva.apache.org/security.html#CVE-2017-5657" }, { "name": "98570", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98570" }, { "name": "1038528", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1038528" }, { "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9 } }, "lastModifiedDate": "2019-04-16T18:29Z", "publishedDate": "2017-05-22T18:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.