First published: Thu Mar 12 2020(Updated: )
CSRF in admin/manage-settings.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to change the global settings, potentially gaining code execution or causing a denial of service, via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chadhaajay Phpkb | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10478 is high with a severity value of 8.8.
CSRF in Chadha PHPKB Standard Multi-Language 9 allows attackers to change the global settings, potentially gaining code execution or causing a denial of service.
Attackers can exploit CVE-2020-10478 by sending a crafted request to the admin/manage-settings.php endpoint in Chadha PHPKB.
Yes, it is recommended to apply the latest patch or upgrade to a version of Chadha PHPKB that has fixed the vulnerability.
More information about CVE-2020-10478 can be found at the following references: [Reference 1](http://antoniocannito.it/?p=343#csrf1), [Reference 2](https://antoniocannito.it/phpkb3#cross-site-request-forgery-when-changing-settings-cve-2020-10478).