Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zikula:zikula_application_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F3EDC0F-1F8B-4F91-BC01-B0EB6C96DF94", "versionEndIncluding": "1.2.4", "vulnerable": true}, {"criteria": "cpe:2.3:a:zikula:zikula_application_framework:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F1B6758-3E03-412F-84BD-83C8B669F738", "vulnerable": true}, {"criteria": "cpe:2.3:a:zikula:zikula_application_framework:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CB69408-9D6A-475F-BB4B-E5F52465FE42", "vulnerable": true}, {"criteria": "cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A76E5B1A-8CD3-40E6-B491-81F7D8B8F86A", "vulnerable": true}, {"criteria": "cpe:2.3:a:zikula:zikula_application_framework:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6EE3D78-D9A4-4CC3-A242-232CA58C6B68", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change account privileges via an edit access_permissions action to index.php."}, {"lang": "es", "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en el m\u00f3dulo \"Users\" (usuarios) de Zikula en versiones anteriores a la 1.2.5. Permite a atacantes remotos secuestrar (\"hijack\") la autenticaci\u00f3n de administradores para peticiones que cambian los privilegios de cuenta a trav\u00e9s de una acci\u00f3n de edici\u00f3n de \"access_permissions\" de index.php."}], "id": "CVE-2011-0535", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2011-02-08T22:00:01.213", "references": [{"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html"}, {"source": "secalert@redhat.com", "url": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG"}, {"source": "secalert@redhat.com", "url": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/02/01/1"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/02/03/1"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2011/Feb/0"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43114"}, {"source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8067"}, {"source": "secalert@redhat.com", "url": "http://www.osvdb.org/70751"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/02/01/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/02/03/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://seclists.org/fulldisclosure/2011/Feb/0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/43114"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8067"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/70751"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}