First published: Tue Feb 04 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in Rapid7 Nexpose Security Console before 5.5.4 allows remote attackers to hijack the authentication of unspecified victims for requests that delete scan data and sites via a request to data/site/delete.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 Nexpose | <=5.5.3 | |
Rapid7 Nexpose | =5.4 | |
Rapid7 Nexpose | =5.4.1 | |
Rapid7 Nexpose | =5.4.2 | |
Rapid7 Nexpose | =5.4.3 | |
Rapid7 Nexpose | =5.4.4 | |
Rapid7 Nexpose | =5.4.5 | |
Rapid7 Nexpose | =5.4.6 | |
Rapid7 Nexpose | =5.4.7 | |
Rapid7 Nexpose | =5.4.8 | |
Rapid7 Nexpose | =5.4.9 | |
Rapid7 Nexpose | =5.4.10 | |
Rapid7 Nexpose | =5.4.11 | |
Rapid7 Nexpose | =5.4.12 | |
Rapid7 Nexpose | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6493 is categorized as a high severity cross-site request forgery vulnerability that can allow attackers to delete scan data.
To fix CVE-2012-6493, upgrade your Rapid7 Nexpose Security Console to version 5.5.4 or later.
CVE-2012-6493 affects all versions of Rapid7 Nexpose Security Console prior to 5.5.4, including versions 5.4.x.
CVE-2012-6493 is a cross-site request forgery (CSRF) vulnerability.
CVE-2012-6493 can lead to unauthorized actions being performed by attackers, such as the deletion of important scan data and sites.