Description
Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). The password recovery form in Revive Adserver is vulnerable to CSRF attacks. This vulnerability could be exploited to send a large number of password recovery emails to the registered users, especially in conjunction with a bug that caused recovery emails to be sent to all the users at once. Both issues have been fixed.
References (3)
Core 3
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://github.com/revive-adserver/revive-adserver/commit/3aaebcc765797d2c684e031f2836e0a69d6b7bc2
Permissions Required x_refsource_misc
https://hackerone.com/reports/99452
Patch, Vendor Advisory x_refsource_misc
https://www.revive-adserver.com/security/revive-sa-2016-001/
Scores
CVSS v3
8.8
EPSS
0.0014
EPSS Percentile
33.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-352
Status
published
Products (2)
n/a/Revive Adserver All versions before 3.2.3
Revive Adserver All versions before 3.2.3
revive-adserver/revive_adserver
< 3.2.2
Published
Mar 28, 2017
Tracked Since
Feb 18, 2026