CVE Vulnerabilities

CVE-2012-3473

Improper Authentication

Published: Aug 12, 2012 | Modified: Aug 13, 2012
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Ushahidi_platform Ushahidi * 2.4.1 (including)
Ushahidi_platform Ushahidi 1.0 (including) 1.0 (including)
Ushahidi_platform Ushahidi 1.2 (including) 1.2 (including)
Ushahidi_platform Ushahidi 2.0 (including) 2.0 (including)
Ushahidi_platform Ushahidi 2.1 (including) 2.1 (including)
Ushahidi_platform Ushahidi 2.2 (including) 2.2 (including)
Ushahidi_platform Ushahidi 2.2.1 (including) 2.2.1 (including)
Ushahidi_platform Ushahidi 2.3.1 (including) 2.3.1 (including)
Ushahidi_platform Ushahidi 2.3.2 (including) 2.3.2 (including)
Ushahidi_platform Ushahidi 2.4 (including) 2.4 (including)

Potential Mitigations

References