Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACE5C1A-6B4F-4997-95EE-A136688872D0", "versionEndIncluding": "1.10.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "332D5DB3-58A3-41BD-907B-6959B07F643B", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E49EB78-5292-44FF-844C-076198E55A25", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1912AB1A-C7A5-403A-873A-52FF7D2C5BDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true}, {"criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106."}, {"lang": "es", "value": "Vulnerabilidad de cross-site request forgery (CSRF) en cmd.cgi en Icinga 1.8.5, 1.9.4, 1.10.2 y anteriores, permite a atacantes secuestrar la autenticaci\u00f3n de usuarios en comandos no especificados a trav\u00e9s de vectores no especificados, como se muestra sorteando requisitos de autenticaci\u00f3n para el CVE-2013-7106."}], "id": "CVE-2013-7107", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-01-15T16:08:03.907", "references": [{"source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html"}, {"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://dev.icinga.org/issues/5250"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://dev.icinga.org/issues/5346"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://dev.icinga.org/issues/5250"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://dev.icinga.org/issues/5346"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}