Description
An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17683 | An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF. |
References
| Link | Providers |
|---|---|
| https://c41nc.co.uk/cve-2020-24983/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:26:09.239Z
Reserved: 2020-08-28T00:00:00.000Z
Link: CVE-2020-24983
No data.
Status : Modified
Published: 2021-03-11T22:15:12.263
Modified: 2024-11-21T05:16:19.813
Link: CVE-2020-24983
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD