ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.
History

Wed, 09 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Ampache
Ampache ampache
CPEs cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
Vendors & Products Ampache
Ampache ampache
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 18:45:00 +0000

Type Values Removed Values Added
Description ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent.
Title Cross-Site Request Forgery in ampache
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-09T18:35:20.080Z

Updated: 2024-10-09T20:20:57.365Z

Reserved: 2024-10-03T14:06:12.642Z

Link: CVE-2024-47828

cve-icon Vulnrichment

Updated: 2024-10-09T20:20:45.887Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-09T19:15:14.423

Modified: 2024-10-17T13:55:23.577

Link: CVE-2024-47828

cve-icon Redhat

No data.