First published: Fri Jan 17 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in VMware vCloud Director 5.1.x before 5.1.3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCloud Director | =5.1.0 | |
VMware vCloud Director | =5.1.1 | |
VMware vCloud Director | =5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-1211 is considered medium due to the impact it can have on user authentication.
To fix CVE-2014-1211, upgrade VMware vCloud Director to version 5.1.3 or later.
CVE-2014-1211 affects VMware vCloud Director versions 5.1.0, 5.1.1, and 5.1.2.
The impact of CVE-2014-1211 allows remote attackers to hijack user sessions and trigger unwanted logouts.
A recommended workaround for CVE-2014-1211 is to disable CSRF protection within the application until an upgrade can be performed.