Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users send messages to one another. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to send messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:* |
Thu, 14 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ampache
Ampache ampache |
|
CPEs | cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ampache
Ampache ampache |
|
Metrics |
cvssV3_1
|
Tue, 12 Nov 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 11 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ampache is a web based audio/video streaming application and file manager. The current implementation of token parsing does not adequately validate CSRF tokens when users send messages to one another. This vulnerability could be exploited to forge CSRF attacks, allowing an attacker to send messages to any user, including administrators, if they interact with a malicious request. This issue has been addressed in version 7.0.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Insufficient Message Token Validation in Ampache | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-11T19:37:45.808Z
Updated: 2024-11-12T01:44:27.158Z
Reserved: 2024-10-28T14:20:59.336Z
Link: CVE-2024-51489
Vulnrichment
Updated: 2024-11-12T01:44:13.448Z
NVD
Status : Analyzed
Published: 2024-11-11T20:15:18.877
Modified: 2024-11-14T20:12:52.027
Link: CVE-2024-51489
Redhat
No data.