Show plain JSON{"id": "CVE-2013-7107", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-01-15T16:08:03.907", "references": [{"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html", "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2013/12/16/4", "source": "cve@mitre.org"}, {"url": "https://dev.icinga.org/issues/5250", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://dev.icinga.org/issues/5346", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2013/12/16/4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://dev.icinga.org/issues/5250", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://dev.icinga.org/issues/5346", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106."}, {"lang": "es", "value": "Vulnerabilidad de cross-site request forgery (CSRF) en cmd.cgi en Icinga 1.8.5, 1.9.4, 1.10.2 y anteriores, permite a atacantes secuestrar la autenticaci\u00f3n de usuarios en comandos no especificados a trav\u00e9s de vectores no especificados, como se muestra sorteando requisitos de autenticaci\u00f3n para el CVE-2013-7106."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ACE5C1A-6B4F-4997-95EE-A136688872D0", "versionEndIncluding": "1.10.2"}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558"}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9"}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23"}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43"}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "332D5DB3-58A3-41BD-907B-6959B07F643B"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E49EB78-5292-44FF-844C-076198E55A25"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1912AB1A-C7A5-403A-873A-52FF7D2C5BDE"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E"}, {"criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}