Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to
- add an administrator user via a crafted POST request to
<vimbadmin directory>/application/controllers/DomainController.php,
- remove an administrator user via a crafted GET request to
<vimbadmin directory>/application/controllers/DomainController.php,
- change an administrator password via a crafted POST request to
<vimbadmin directory>/application/controllers/DomainController.php,
- add a mailbox via a crafted POST request to
<vimbadmin directory>/application/controllers/MailboxController.php,
- delete a mailbox via a crafted POST request to
<vimbadmin directory>/application/controllers/MailboxController.php,
- archive a mailbox address via a crafted GET request to
<vimbadmin directory>/application/controllers/ArchiveController.php,
- add an alias address via a crafted POST request to
<vimbadmin directory>/application/controllers/AliasController.php, or
- remove an alias address via a crafted GET request to
<vimbadmin directory>/application/controllers/AliasController.php.
References
Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to
<vimbadmin directory>/application/controllers/DomainController.php,<vimbadmin directory>/application/controllers/DomainController.php,<vimbadmin directory>/application/controllers/DomainController.php,<vimbadmin directory>/application/controllers/MailboxController.php,<vimbadmin directory>/application/controllers/MailboxController.php,<vimbadmin directory>/application/controllers/ArchiveController.php,<vimbadmin directory>/application/controllers/AliasController.php, or<vimbadmin directory>/application/controllers/AliasController.php.References