First published: Wed Oct 14 2015(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Revive Adserver before 3.2.2 allow remote attackers to hijack the authentication of users for requests that (1) perform certain plugin actions and possibly cause a denial of service (disabled core plugins) via unknown vectors or (2) change the contact name and language or possibly have unspecified other impact via a crafted POST request to an account-user-*.php script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Revive Adserver | <=3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7366 has a medium severity level due to the potential for unauthorized actions performed on behalf of authenticated users.
To fix CVE-2015-7366, upgrade to Revive Adserver version 3.2.2 or later.
CVE-2015-7366 allows remote attackers to hijack user authentication and potentially disable core plugins.
CVE-2015-7366 affects all versions of Revive Adserver prior to version 3.2.2.
Yes, CVE-2015-7366 may potentially allow denial of service through the disabling of core plugins.