First published: Mon Aug 13 2012(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to hijack the authentication of administrators for requests that (1) remove file access restriction via a deletehtaccess action, (2) drop a database via a kill value in a db action, (3) uninstall the application via a 101 value in the phase parameter to learn/cubemail/install.php, (4) delete config.php via a 2 value in the phase parameter to learn/cubemail/install.php, (5) change a password via a schutz action, or (6) execute arbitrary SQL commands via the sql_statement parameter to learn/cubemail/sql.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mysqldumper | =1.24.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4252 is classified as a high severity vulnerability due to its potential to allow unauthorized access and administrative action by attackers.
To fix CVE-2012-4252, upgrade MySQLDumper to version 1.24.5 or later, which contains patches for these vulnerabilities.
CVE-2012-4252 allows remote attackers to perform cross-site request forgery (CSRF) attacks that can compromise administrator authentication.
CVE-2012-4252 specifically affects MySQLDumper version 1.24.4.
Administrators using MySQLDumper 1.24.4 are at risk of being targeted by attackers leveraging the CSRF vulnerabilities.