ID

VAR-201602-0293


CVE

CVE-2015-7678


TITLE

Ipswitch MOVEit Mobile Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2015-006875

DESCRIPTION

Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and earlier allow remote attackers to hijack the authentication of unspecified victims via unknown vectors. Ipswitch MOVEit Mobile Contains a cross-site request forgery vulnerability.Authentication may be hijacked by a third party. Ipswitch MOVEit is an automated file transfer system from Ipswitch Corporation in the United States. The system supports control, management, and visibility into all business-critical file transfer activities through a single, secure system. Mobile is one version. A remote attacker could exploit this vulnerability to perform unauthorized operations

Trust: 1.71

sources: NVD: CVE-2015-7678 // JVNDB: JVNDB-2015-006875 // VULHUB: VHN-85639

AFFECTED PRODUCTS

vendor:ipswitchmodel:moveit mobilescope:lteversion:1.2.0.962

Trust: 1.8

vendor:ipswitchmodel:moveit mobilescope:eqversion:1.2.0.962

Trust: 0.6

sources: JVNDB: JVNDB-2015-006875 // CNNVD: CNNVD-201602-209 // NVD: CVE-2015-7678

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7678
value: HIGH

Trust: 1.0

NVD: CVE-2015-7678
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201602-209
value: MEDIUM

Trust: 0.6

VULHUB: VHN-85639
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7678
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-85639
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7678
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-85639 // JVNDB: JVNDB-2015-006875 // CNNVD: CNNVD-201602-209 // NVD: CVE-2015-7678

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-85639 // JVNDB: JVNDB-2015-006875 // NVD: CVE-2015-7678

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201602-209

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201602-209

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006875

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-85639

PATCH

title:MOVEit Mobileurl:http://www.ipswitchft.com/moveit-managed-file-transfer/mobile-file-transfer

Trust: 0.8

sources: JVNDB: JVNDB-2015-006875

EXTERNAL IDS

db:NVDid:CVE-2015-7678

Trust: 2.5

db:PACKETSTORMid:135460

Trust: 1.7

db:JVNDBid:JVNDB-2015-006875

Trust: 0.8

db:CNNVDid:CNNVD-201602-209

Trust: 0.7

db:VULHUBid:VHN-85639

Trust: 0.1

sources: VULHUB: VHN-85639 // JVNDB: JVNDB-2015-006875 // CNNVD: CNNVD-201602-209 // NVD: CVE-2015-7678

REFERENCES

url:https://www.profundis-labs.com/advisories/cve-2015-7678.txt

Trust: 2.5

url:http://seclists.org/fulldisclosure/2016/jan/95

Trust: 1.7

url:http://packetstormsecurity.com/files/135460/ipswitch-moveit-mobile-1.2.0.962-cross-site-request-forgery.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7678

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7678

Trust: 0.8

sources: VULHUB: VHN-85639 // JVNDB: JVNDB-2015-006875 // CNNVD: CNNVD-201602-209 // NVD: CVE-2015-7678

SOURCES

db:VULHUBid:VHN-85639
db:JVNDBid:JVNDB-2015-006875
db:CNNVDid:CNNVD-201602-209
db:NVDid:CVE-2015-7678

LAST UPDATE DATE

2025-04-12T23:29:29.063000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-85639date:2016-02-18T00:00:00
db:JVNDBid:JVNDB-2015-006875date:2016-02-19T00:00:00
db:CNNVDid:CNNVD-201602-209date:2016-02-15T00:00:00
db:NVDid:CVE-2015-7678date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-85639date:2016-02-10T00:00:00
db:JVNDBid:JVNDB-2015-006875date:2016-02-19T00:00:00
db:CNNVDid:CNNVD-201602-209date:2016-02-15T00:00:00
db:NVDid:CVE-2015-7678date:2016-02-10T15:59:02.490