CVE Vulnerabilities

CVE-2012-3473

Improper Authentication

Published: Aug 12, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Ushahidi_platformUshahidi*2.4.1 (including)
Ushahidi_platformUshahidi1.0 (including)1.0 (including)
Ushahidi_platformUshahidi1.2 (including)1.2 (including)
Ushahidi_platformUshahidi2.0 (including)2.0 (including)
Ushahidi_platformUshahidi2.1 (including)2.1 (including)
Ushahidi_platformUshahidi2.2 (including)2.2 (including)
Ushahidi_platformUshahidi2.2.1 (including)2.2.1 (including)
Ushahidi_platformUshahidi2.3.1 (including)2.3.1 (including)
Ushahidi_platformUshahidi2.3.2 (including)2.3.2 (including)
Ushahidi_platformUshahidi2.4 (including)2.4 (including)

Potential Mitigations

References