{"vuid":"VU#584363","idnumber":"584363","name":"Zenprise Device Manager CSRF vulnerability","keywords":["Zenprise Device Manager CSRF"],"overview":"The Zenprise Device Manager software is susceptible to a cross-site request forgery (CSRF) vulnerability that may result in the compromise of the fleet of mobile devices managed by the product.","clean_desc":"Zenprise Device Manager is a mobile device management (MDM) software package that can be used to manage an enterprise's mobile device fleet. The Zenprise Device manager web interface is vulnerable to cross-site request forgery (CSRF) attacks. A successful CSRF attack against an admin user will allow a remote attacker to run commands as the admin user on any device managed by Zenprise Device Manager.","impact":"By tricking a logged in admin user to visit a specially crafted URL, a remote attacker may be able to access any managed device as the admin. The attacker can then perform any action an admin can, including remotely wiping the device.","resolution":"Apply an update Zenprise has released a patch to address this issue. Current customers can find more information about this vulnerability and patch on the Zenprise customer center.","workarounds":"","sysaffected":"","thanks":"Thanks to Laurent Oudot of TEHTRI-Security for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.zenprise.com/products/zenprise_device_manager/","http://www.zenpriseportal.com/patches/ZP_SecPatch_618_9995.zip","http://cwe.mitre.org/data/definitions/352.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-09-21T13:41:32Z","publicdate":"2011-11-18T00:00:00Z","datefirstpublished":"2011-11-18T14:18:57Z","dateupdated":"2012-08-03T20:53:21Z","revision":18,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"2","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"9","cam_easeofexploitation":"11","cam_attackeraccessrequired":"8","cam_scorecurrent":"0.891","cam_scorecurrentwidelyknown":"3.7125","cam_scorecurrentwidelyknownexploited":"6.3855","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.891,"vulnote":null}