ID

VAR-201210-0414


CVE

CVE-2012-5320


TITLE

Sagem F@ST 2604 of password.cgi Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2012-004826

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability in password.cgi in Sagem F@ST 2604 253180972B allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the sysPassword parameter. Sagem F@st is a router product. Sagem F@st 2604 has a cross-site request forgery vulnerability. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Sagem F@st 2604 Cross-Site Request Forgery Vulnerability SECUNIA ADVISORY ID: SA48088 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48088 RELEASE DATE: 2012-02-28 DISCUSS ADVISORY: http://secunia.com/advisories/48088/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48088/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48088 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Sagem F@st 2604, which can be exploited by malicious people to conduct cross-site request forgery attacks. This can be exploited to e.g. change an administrator's password by tricking a logged in administrator into visiting a malicious web site. SOLUTION: Do not browse untrusted sites or follow untrusted links while being logged-in to the application. PROVIDED AND/OR DISCOVERED BY: KinG Of PiraTeS ORIGINAL ADVISORY: http://www.exploit-db.com/exploits/18504/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2012-5320 // JVNDB: JVNDB-2012-004826 // CNVD: CNVD-2012-0925 // VULHUB: VHN-58601 // PACKETSTORM: 110271

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-0925

AFFECTED PRODUCTS

vendor:sagemmodel:f\@st 2604scope:eqversion:253180972b

Trust: 1.6

vendor:sagemmodel:f\@st 2604scope:eqversion: -

Trust: 1.0

vendor:sagemcommodel:sagem f@st 2604scope: - version: -

Trust: 0.8

vendor:sagemcommodel:sagem f@st 2604scope:eqversion:253180972b

Trust: 0.8

vendor:sagemmodel:f@stscope:eqversion:2604

Trust: 0.6

sources: CNVD: CNVD-2012-0925 // JVNDB: JVNDB-2012-004826 // CNNVD: CNNVD-201210-087 // NVD: CVE-2012-5320

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5320
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5320
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201210-087
value: MEDIUM

Trust: 0.6

VULHUB: VHN-58601
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5320
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-58601
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-58601 // JVNDB: JVNDB-2012-004826 // CNNVD: CNNVD-201210-087 // NVD: CVE-2012-5320

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-58601 // JVNDB: JVNDB-2012-004826 // NVD: CVE-2012-5320

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201210-087

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201210-087

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004826

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-58601

PATCH

title:Broadband Accessurl:http://www.sagemcom.com/index.php?id=41

Trust: 0.8

sources: JVNDB: JVNDB-2012-004826

EXTERNAL IDS

db:SECUNIAid:48088

Trust: 2.5

db:NVDid:CVE-2012-5320

Trust: 2.5

db:EXPLOIT-DBid:18504

Trust: 1.8

db:OSVDBid:79649

Trust: 1.7

db:JVNDBid:JVNDB-2012-004826

Trust: 0.8

db:CNNVDid:CNNVD-201210-087

Trust: 0.7

db:CNVDid:CNVD-2012-0925

Trust: 0.6

db:XFid:73380

Trust: 0.6

db:SEEBUGid:SSVID-72598

Trust: 0.1

db:VULHUBid:VHN-58601

Trust: 0.1

db:PACKETSTORMid:110271

Trust: 0.1

sources: CNVD: CNVD-2012-0925 // VULHUB: VHN-58601 // JVNDB: JVNDB-2012-004826 // PACKETSTORM: 110271 // CNNVD: CNNVD-201210-087 // NVD: CVE-2012-5320

REFERENCES

url:http://www.exploit-db.com/exploits/18504

Trust: 1.7

url:http://www.osvdb.org/79649

Trust: 1.7

url:http://secunia.com/advisories/48088

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/73380

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5320

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5320

Trust: 0.8

url:http://secunia.com/advisories/48088/

Trust: 0.7

url:http://xforce.iss.net/xforce/xfdb/73380

Trust: 0.6

url:http://secunia.com/advisories/48088/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48088

Trust: 0.1

url:http://www.exploit-db.com/exploits/18504/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-0925 // VULHUB: VHN-58601 // JVNDB: JVNDB-2012-004826 // PACKETSTORM: 110271 // CNNVD: CNNVD-201210-087 // NVD: CVE-2012-5320

CREDITS

Secunia

Trust: 0.1

sources: PACKETSTORM: 110271

SOURCES

db:CNVDid:CNVD-2012-0925
db:VULHUBid:VHN-58601
db:JVNDBid:JVNDB-2012-004826
db:PACKETSTORMid:110271
db:CNNVDid:CNNVD-201210-087
db:NVDid:CVE-2012-5320

LAST UPDATE DATE

2025-04-11T22:59:15.080000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-0925date:2012-03-01T00:00:00
db:VULHUBid:VHN-58601date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2012-004826date:2012-10-11T00:00:00
db:CNNVDid:CNNVD-201210-087date:2012-10-12T00:00:00
db:NVDid:CVE-2012-5320date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-0925date:2012-03-01T00:00:00
db:VULHUBid:VHN-58601date:2012-10-08T00:00:00
db:JVNDBid:JVNDB-2012-004826date:2012-10-11T00:00:00
db:PACKETSTORMid:110271date:2012-02-29T08:02:40
db:CNNVDid:CNNVD-201210-087date:2012-10-12T00:00:00
db:NVDid:CVE-2012-5320date:2012-10-08T18:55:01.323