First published: Fri Dec 31 2004(Updated: )
Cross-site request forgery (CSRF) vulnerability in YaBB 1 GOLD SP 1.3.2 allows remote attackers to perform unauthorized actions as the administrative user via a link or IMG tag to YaBB.pl that specifies the desired action, id, and moda parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yabb | =2000-09-11 | |
Yabb | =1.40 | |
Yabb | =1_gold_-_sp_1 | |
Yabb | =1_gold_-_sp_1.3.2 | |
Yabb | =1_gold_-_sp_1.3 | |
Yabb | =2000-09-01 | |
Yabb | =1_gold_-_sp_1.2 | |
Yabb | =1.41 | |
Yabb | =1_gold_release | |
Yabb | =1_gold_-_sp_1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2403 is considered to be a medium severity vulnerability due to its potential for unauthorized administrative actions.
To fix CVE-2004-2403, it is essential to implement CSRF tokens in forms and validate requests to ensure they originate from legitimate users.
CVE-2004-2403 affects YaBB versions 1.40, 1.41, and all 1 Gold SP 1.x versions including 1.3.2.
Attackers exploiting CVE-2004-2403 can perform unauthorized actions such as making changes to the forum or user settings as the administrative user.
There is no specific patch for CVE-2004-2403, but updating to fixed versions and applying best practices for CSRF protection can mitigate the risk.