Description
Cross-site request forgery attacks can be carried out against the Eyes of Network web application, due to an absence of adequate protections. An attacker can, for instance, delete the admin user by directing an authenticated user to the URL https://<target-address>/module/admin_user/index.php?DataTables_Table_0_length=10&user_selected%5B%5D=1&user_mgt_list=delete_user&action=submit by means of a crafted link.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-40948 | Cross-site request forgery attacks can be carried out against the Eyes of Network web application, due to an absence of adequate protections. An attacker can, for instance, delete the admin user by directing an authenticated user to the URL https://<target-address>/module/admin_user/index.php?DataTables_Table_0_length=10&user_selected%5B%5D=1&user_mgt_list=delete_user&action=submit by means of a crafted link. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2022-29 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T10:54:03.294Z
Reserved: 2022-08-15T00:00:00.000Z
Link: CVE-2022-38359
No data.
Status : Modified
Published: 2022-08-15T23:15:09.637
Modified: 2024-11-21T07:16:19.600
Link: CVE-2022-38359
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD