First published: Wed May 14 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in OpenX 2.8.10, possibly before revision 82710, allow remote attackers to hijack the authentication of administrators, as demonstrated by requests that conduct directory traversal attacks via the group parameter to (1) plugin-preferences.php or (2) plugin-settings.php in www/admin, a different vulnerability than CVE-2013-3514.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open edX | =2.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7376 has a moderate severity rating due to its potential to allow remote attackers to hijack administrator authentication.
To fix CVE-2013-7376, it is recommended to apply patches provided by OpenX or upgrade to a later version that addresses these vulnerabilities.
CVE-2013-7376 specifically affects OpenX version 2.8.10 and potentially earlier revisions.
CVE-2013-7376 allows for cross-site request forgery (CSRF) attacks, which can lead to unauthorized actions performed on behalf of an authenticated user.
CVE-2013-7376 can be exploited by remote attackers with the ability to craft malicious requests to target the vulnerable OpenX installation.