{"vuid":"VU#173009","idnumber":"173009","name":"Snare Agent web interface cross-site request forgery vulnerabilities","keywords":["HIO-2010-0426"],"overview":"The Snare Agent web interface is susceptible to cross-site request forgery attacks.","clean_desc":"The web interface allows the administrator to manage several agent settings, including changing the listening port and password. These HTTP requests do not perform proper validity checks and are susceptible to a cross-site request forgery attack. The vulnerability is reported in the following products and versions: Snare for Solaris 3.2.3 and prior\nSnare for Windows 3.1.7 and prior\nSnare for Linux 1.5.0 and prior\nSnare for AIX 1.5.0 and prior\nSnare for Irix 1.4 and prior\nEpilog for Windows 1.5.3 and prior\nEpilog for Unix version 1.2 and prior","impact":"An attacker can change several agent settings, such as the password or listening port, if able to trick an administrator into visiting a specially crafted link.","resolution":"The vendor has released patched versions of the agent to remediate this issue.","workarounds":"","sysaffected":"","thanks":"Thanks to Russ McRee for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://holisticinfosec.org/content/view/144/45/","http://secunia.com/advisories/39562","http://www.intersectalliance.com/projects/index.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-04-29T14:50:28Z","publicdate":"2010-06-29T00:00:00Z","datefirstpublished":"2010-06-29T17:11:27Z","dateupdated":"2010-07-01T18:56:03Z","revision":16,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}