Cross-site request forgery (CSRF) vulnerability in Zenoss Core through 5 Beta 3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger arbitrary code execution via a ZenPack upload, aka ZEN-15388.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zenoss_core | Zenoss | 2.4.0 (including) | 2.4.0 (including) |
Zenoss_core | Zenoss | 2.4.5 (including) | 2.4.5 (including) |
Zenoss_core | Zenoss | 2.5.0 (including) | 2.5.0 (including) |
Zenoss_core | Zenoss | 2.5.1 (including) | 2.5.1 (including) |
Zenoss_core | Zenoss | 2.5.2 (including) | 2.5.2 (including) |
Zenoss_core | Zenoss | 3.0.0 (including) | 3.0.0 (including) |
Zenoss_core | Zenoss | 3.0.1 (including) | 3.0.1 (including) |
Zenoss_core | Zenoss | 3.0.2 (including) | 3.0.2 (including) |
Zenoss_core | Zenoss | 3.0.3 (including) | 3.0.3 (including) |
Zenoss_core | Zenoss | 3.1.0 (including) | 3.1.0 (including) |
Zenoss_core | Zenoss | 3.2.0 (including) | 3.2.0 (including) |
Zenoss_core | Zenoss | 3.2.1 (including) | 3.2.1 (including) |
Zenoss_core | Zenoss | 4.2.0 (including) | 4.2.0 (including) |
Zenoss_core | Zenoss | 4.2.3 (including) | 4.2.3 (including) |
Zenoss_core | Zenoss | 4.2.4 (including) | 4.2.4 (including) |
Zenoss_core | Zenoss | 4.2.5 (including) | 4.2.5 (including) |
Zenoss_core | Zenoss | 5.0.0 (including) | 5.0.0 (including) |
Zenoss_core | Zenoss | 5.0.0-beta_1 (including) | 5.0.0-beta_1 (including) |
Zenoss_core | Zenoss | 5.0.0-beta_2 (including) | 5.0.0-beta_2 (including) |
Zenoss_core | Zenoss | 5.0.0-beta_3 (including) | 5.0.0-beta_3 (including) |