{"vuid":"VU#611988","idnumber":"611988","name":"Vanilla Forums version 2.1.a26 contains a parameter manipulation vulnerability","keywords":["vanilla","forums","cwe-280"],"overview":"Vanilla Forums version 2.1.a26 and possibly other versions is vulnerable to parameter manipulation via the \"edit profile\" page of authenticated users.","clean_desc":"CWE-280: Improper Handling of Insufficient Permissions or Privileges\nVanilla Forums version 2.1.a26 and possibly other versions are vulnerable to parameter manipulation via the \"edit profile\" page of authenticated users. An attacker with the ability to man-in-the-middle the connection using a proxy can alter the \"UserID\" of the user they wish to change allowing them to alter any profile setting and even change the email address.","impact":"An authenticated attacker can alter any profile setting including changing the email address for any user on the forum.","resolution":"Update The vendor has stated this vulnerability has been addressed in version 2.1a32. Users are advised to update to version 2.1a32 or higher.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing a web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Phillip Gonzalez for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","v","a","n","i","l","l","a","f","o","r","u","m","s",".","o","r","g","/","d","o","w","n","l","o","a","d"],"cveids":["CVE-2012-4954"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-09-05T17:07:16Z","publicdate":"2012-11-12T00:00:00Z","datefirstpublished":"2012-11-12T12:19:11Z","dateupdated":"2012-11-12T19:06:05Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"C","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.3","cvss_basevector":"AV:N/AC:M/Au:S/C:N/I:C/A:N","cvss_temporalscore":"4.8","cvss_environmentalscore":"1.3","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}