ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ampache
Ampache ampache |
|
CPEs | cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ampache
Ampache ampache |
|
Metrics |
ssvc
|
Wed, 09 Oct 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent. | |
Title | Cross-Site Request Forgery in ampache | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-09T18:35:20.080Z
Updated: 2024-10-09T20:20:57.365Z
Reserved: 2024-10-03T14:06:12.642Z
Link: CVE-2024-47828
Vulnrichment
Updated: 2024-10-09T20:20:45.887Z
NVD
Status : Analyzed
Published: 2024-10-09T19:15:14.423
Modified: 2024-10-17T13:55:23.577
Link: CVE-2024-47828
Redhat
No data.