Description
Multiple cross-site request forgery (CSRF) vulnerabilities in OpenX 2.8.11 and earlier allow remote attackers to hijack the authentication of administrators for requests that delete (1) users via admin/agency-user-unlink.php, (2) advertisers via admin/advertiser-delete.php, (3) banners via admin/banner-delete.php, (4) campaigns via admin/campaign-delete.php, (5) channels via admin/channel-delete.php, (6) affiliate websites via admin/affiliate-delete.php, or (7) zones via admin/zone-delete.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Mahmoud Ghorbanzadeh · textwebappsphp
https://www.exploit-db.com/exploits/39117
References (7)
Core 7
Core References
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/May/68
Exploit x_refsource_misc
http://packetstormsecurity.com/files/125735
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Mar/270
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/66251
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/532108/100/0/threaded
Various Sources x_refsource_confirm
http://www.revive-adserver.com/security/revive-sa-2014-001/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/91889
Scores
EPSS
0.0327
EPSS Percentile
87.2%
Details
CWE
CWE-352
Status
published
Products (13)
openx/openx
2.8
openx/openx
2.8.1
openx/openx
2.8.2
openx/openx
2.8.3
openx/openx
2.8.4
openx/openx
2.8.5
openx/openx
2.8.6
openx/openx
2.8.7
openx/openx
2.8.8
openx/openx
2.8.9
... and 3 more
Published
Apr 25, 2014
Tracked Since
Feb 18, 2026