Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users delete messages. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to delete messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Tue, 12 Nov 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 Nov 2024 19:45:00 +0000

Type Values Removed Values Added
Description Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users delete messages. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to delete messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Insufficient Validation in Delete Message in Ampache
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-11T19:42:29.878Z

Updated: 2024-11-12T01:44:07.126Z

Reserved: 2024-10-28T14:20:59.336Z

Link: CVE-2024-51488

cve-icon Vulnrichment

Updated: 2024-11-12T01:43:53.948Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-11T20:15:18.757

Modified: 2024-11-12T13:55:21.227

Link: CVE-2024-51488

cve-icon Redhat

No data.