CVE-2017-14956
moderate-risk
Published 2017-10-18
AlienVault USM v5.4.2 and earlier offers authenticated users the functionality of exporting generated reports via the "/ossim/report/wizard_email.php" script. Besides offering an export via a local download, the script also offers the possibility to send out any report via email to a given address (either in PDF or XLS format). Since there is no anti-CSRF token protecting this functionality, it is vulnerable to Cross-Site Request Forgery attacks.
Do I need to act?
-
0.86% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.7/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (12)
Third Party Advisory
http://www.securityfocus.com/archive/1/541342/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/101284
Third Party Advisory
http://www.securityfocus.com/archive/1/541342/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/101284
30
/ 100
moderate-risk
Severity
22/34 · High
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal