First published: Mon Mar 16 2020(Updated: )
Zoho ManageEngine Password Manager Pro 10.4 and prior has no protection against Cross-site Request Forgery (CSRF) attacks, as demonstrated by changing a user's role.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Password Manager Pro | <10.4 | |
Zohocorp Manageengine Password Manager Pro | =10.4 | |
Zohocorp Manageengine Password Manager Pro | =10.4-build10400 | |
Zohocorp Manageengine Password Manager Pro | =10.4-build10401 | |
Zohocorp Manageengine Password Manager Pro | =10.4-build10402 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9346 is a vulnerability in Zoho ManageEngine Password Manager Pro 10.4 and prior that allows for Cross-site Request Forgery (CSRF) attacks.
The severity of CVE-2020-9346 is high, with a CVSS score of 8.8.
CVE-2020-9346 affects Zoho ManageEngine Password Manager Pro 10.4 and prior versions by not providing protection against CSRF attacks, allowing for unauthorized changes to a user's role.
To fix CVE-2020-9346, users should update to a version of Zoho ManageEngine Password Manager Pro that includes the necessary protection against CSRF attacks.
More information about CVE-2020-9346 can be found in the provided references: https://www.infigo.hr/upload/web_struktura/Zoho_ManageEngine_Password_Manager_Pro_10.4_CSRF.txt and https://www.manageengine.com/products/passwordmanagerpro/issues-fixed.html