Multiple cross-site request forgery (CSRF) vulnerabilities in Post Revolution 0.8.0c-2 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests to (1) ajax-weblog-guardar.php, (2) verpost.php, (3) comments.php, or (4) perfil.php.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Post_revolution | Postrev | * | 0.8.0c-2 (including) |
Post_revolution | Postrev | 0.6.2-beta (including) | 0.6.2-beta (including) |
Post_revolution | Postrev | 0.6.3-beta (including) | 0.6.3-beta (including) |
Post_revolution | Postrev | 0.6.4 (including) | 0.6.4 (including) |
Post_revolution | Postrev | 0.6.5 (including) | 0.6.5 (including) |
Post_revolution | Postrev | 0.6.6 (including) | 0.6.6 (including) |
Post_revolution | Postrev | 0.7.0-rc1 (including) | 0.7.0-rc1 (including) |
Post_revolution | Postrev | 0.7.0-rc2 (including) | 0.7.0-rc2 (including) |
Post_revolution | Postrev | 0.7.0-rc3 (including) | 0.7.0-rc3 (including) |
Post_revolution | Postrev | 0.7.0-rc4 (including) | 0.7.0-rc4 (including) |
Post_revolution | Postrev | 0.8.0-alpha (including) | 0.8.0-alpha (including) |
Post_revolution | Postrev | 0.8.0b (including) | 0.8.0b (including) |
Post_revolution | Postrev | 0.8.0c (including) | 0.8.0c (including) |