First published: Mon Aug 21 2017(Updated: )
A Cross-Site Request Forgery (CWE-352) vulnerability in Directory Server (aka Enterprise Server Administration web UI) in Micro Focus Enterprise Developer and Enterprise Server 2.3 and earlier, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allows remote unauthenticated attackers to view and alter (CWE-275) configuration information and inject OS commands (CWE-78) via forged requests.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Directory Server | ||
Micro Focus Enterprise Developer | =2.3 | |
Micro Focus Enterprise Developer | =2.3-update1 | |
Micro Focus Enterprise Developer | =2.3-update2 | |
Micro Focus Enterprise Server | <=2.3 | |
Micro Focus Enterprise Server | =2.3-update1 | |
Micro Focus Enterprise Server | =2.3-update2 | |
Micro Focus Enterprise Server Monitor And Control |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5187 has been classified as a high severity vulnerability due to its potential for exploitation by remote unauthenticated attackers.
To fix CVE-2017-5187, apply the relevant hotfixes provided by Micro Focus for the affected versions of Directory Server and Enterprise Developer.
CVE-2017-5187 affects Micro Focus Directory Server, Enterprise Developer versions 2.3 and earlier, and Enterprise Server versions up to 2.3.
CVE-2017-5187 can be exploited through Cross-Site Request Forgery (CSRF) attacks, allowing unauthorized actions to be performed on behalf of a user.
No, authentication is not required to exploit CVE-2017-5187, making it particularly dangerous for vulnerable systems.