Сross-Site Request Forgery (CSRF) in TestLink
This vulnerability was discovered by our security researchers before 2019.
| Advisory ID: | HTB23088 |
| Product: | TestLink |
| Vendor: | TestLink |
| Vulnerable Versions: | 1.9.3 and probably prior |
| Tested Version: | 1.9.3 |
| Advisory Publication: | April 18, 2012 [without technical details] |
| Vendor Notification: | April 18, 2012 |
| Vendor Fix: | September 2, 2012 |
| Public Disclosure: | September 5, 2012 |
| Latest Update: | May 30, 2012 |
| Vulnerability Type: | Cross-Site Request Forgery [CWE-352] |
| CVE Reference: | CVE-2012-2275 |
| Risk Level: | Medium |
| CVSSv2 Base Score: | 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) |
| Solution Status: | Fixed by Vendor |
| Discovered and Provided: | High-Tech Bridge Security Research Lab |
| Advisory Details: | |
High-Tech Bridge Security Research Lab has discovered vulnerabiliy in TestLink, which can be exploited to perform Сross-Site Request Forgery (CSRF) attacks. | |
| Solution: | |
| Upgrade to TestLink 1.9.4 More Information: http://gitorious.org/testlink-ga/testlink-code/commit/2d4ac941314f8bda80e265c9de8bacf17d1cd3e6 http://gitorious.org/testlink-ga/testlink-code/commit/c8751a3c9ad8970b49d1bf882203efacd10af087 http://gitorious.org/testlink-ga/testlink-code/commit/252788c2373e73173172ada9af661e0721599891 Third-party disclosed vulnerability details on August 13, 2012 without vendor's patch: http://itsecuritysolutions.org/2012-08-13-TestLink-1.9.3-multiple-vulnerabilities/ | |
| | |
References: | |
| [1] High-Tech Bridge Advisory HTB23088 - https://www.immuniweb.com/advisory/HTB23088 - Сross-Site Request Forgery (CSRF) in TestLink. [2] TestLink - http://www.teamst.org/ - An OpenSource test management tool which includes test specification, planning, reporting, requirements tracking and collaborate with well-known bug trackers. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.