Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-7634
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-01 Mar, 2018 | 23:29
Updated At-22 Mar, 2018 | 13:59

An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

Enalean SAS
enalean
>>tuleap>>9.17
cpe:2.3:a:enalean:tuleap:9.17:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-352Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189cve@mitre.org
Patch
https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/cve@mitre.org
Exploit
Patch
Third Party Advisory
https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=commit&h=d6701289ae55de900929ff0f66313fa9771a198dcve@mitre.org
Issue Tracking
Patch
Vendor Advisory
https://tuleap.net/plugins/tracker/?aid=11217cve@mitre.org
Patch
Vendor Advisory
https://twitter.com/Mustafaran/status/970745812887199744cve@mitre.org
Exploit
Third Party Advisory
Change History
0Changes found

Details not found