Vulnerabilities > CVE-2006-5878 - Cross-Site Request Forgery vulnerability in Trac
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors. This vulnerability is addressed in the following product release: Edgewall Software, Trac, 0.10.1
Vulnerable Configurations
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200612-14.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200612-14 (Trac: Cross-site request forgery) Trac allows users to perform certain tasks via HTTP requests without performing correct validation on those requests. Impact : An attacker could entice an authenticated user to browse to a specially crafted URL, allowing the attacker to execute actions in the Trac instance as if they were the user. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23866 |
published | 2006-12-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23866 |
title | GLSA-200612-14 : Trac: Cross-site request forgery |
code |
|
References
- http://secunia.com/advisories/22789
- http://secunia.com/advisories/22868
- http://secunia.com/advisories/23357
- http://security.gentoo.org/glsa/glsa-200612-14.xml
- http://trac.edgewall.org/ticket/4049
- http://trac.edgewall.org/wiki/ChangeLog
- http://www.debian.org/security/2006/dsa-1209
- http://www.vupen.com/english/advisories/2006/4422
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30146