Description
Multiple cross-site request forgery (CSRF) vulnerabilities in Kasseler CMS before 2 r1232 allow remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the (1) groups[] parameter in a send action in the sendmail module or (2) query parameter in a sql_query action in the database module to admin.php, related to CVE-2013-3727.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/26623
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/94781
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23158
Exploit mailing-list
x_refsource_bugtraq
http://seclists.org/bugtraq/2013/Jul/26
Various Sources x_refsource_confirm
http://diff.kasseler-cms.net/svn.html
Exploit x_refsource_misc
http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html
Patch, Vendor Advisory x_refsource_confirm
http://diff.kasseler-cms.net/svn/patches/1232.html
Scores
EPSS
0.0346
EPSS Percentile
87.6%
Details
CWE
CWE-352
Status
published
Products (1)
kasseler-cms/kasseler-cms
< 2
Published
Mar 13, 2014
Tracked Since
Feb 18, 2026