First published: Thu Jul 28 2016(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Archiva | <=1.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4469 is considered to have a medium severity due to the potential for remote attackers to hijack administrator authentication.
To fix CVE-2016-4469, upgrade to a version of Apache Archiva later than 1.3.9 that addresses the CSRF vulnerabilities.
CVE-2016-4469 allows for cross-site request forgery attacks that could lead to unauthorized actions performed on behalf of the administrator.
CVE-2016-4469 affects Apache Archiva versions up to and including 1.3.9.
CVE-2016-4469 allows an attacker to create requests that can manipulate repository proxy connectors without the administrator's knowledge.