First published: Wed Apr 24 2013(Updated: )
Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 before SP6 Patch 1 allows remote attackers to hijack the authentication of arbitrary users by leveraging improper request validation by iManager code deployed within an Apache Tomcat container.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iManager | <=2.7 | |
Novell iManager | =2.7 | |
Novell iManager | =2.7-refresh6 | |
Novell iManager | =2.7-sp4 | |
Novell iManager | =2.7-sp4_patch1 | |
Novell iManager | =2.7-sp4_patch2 | |
Novell iManager | =2.7-sp4_patch3 | |
Novell iManager | =2.7-sp4_patch4 | |
Novell iManager | =2.7-sp5 | |
Novell iManager | =2.7.1 | |
Novell iManager | =2.7.2 | |
Novell iManager | =2.7.3 | |
Novell iManager | =2.7.3-ftf2 | |
Novell iManager | =2.7.3-ftf4 | |
Novell iManager | =2.7.3-sp3 | |
Novell iManager | =2.7.4 | |
Novell iManager | =2.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1088 is classified as a medium severity vulnerability due to its potential for CSRF attacks.
To fix CVE-2013-1088, upgrade to Novell iManager version 2.7 after SP6 Patch 1 or apply relevant security patches.
CVE-2013-1088 allows attackers to hijack user authentication, potentially compromising sensitive data and user accounts.
CVE-2013-1088 affects Novell iManager versions prior to 2.7 SP6 Patch 1.
Yes, CVE-2013-1088 can be exploited remotely by attackers without requiring physical access to the system.