Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.osvdb.org/70751", "name": "70751", "tags": [], "refsource": "OSVDB"}, {"url": "http://seclists.org/fulldisclosure/2011/Feb/0", "name": "20110201 Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability", "tags": ["Exploit"], "refsource": "FULLDISC"}, {"url": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released", "name": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released", "tags": [], "refsource": "CONFIRM"}, {"url": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html", "name": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/43114", "name": "43114", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://openwall.com/lists/oss-security/2011/02/03/1", "name": "[oss-security] 20110203 Re: CVE Request: Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability", "tags": ["Exploit"], "refsource": "MLIST"}, {"url": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG", "name": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG", "tags": [], "refsource": "CONFIRM"}, {"url": "http://openwall.com/lists/oss-security/2011/02/01/1", "name": "[oss-security] 20110201 CVE Request: Zikula CMS 1.2.4 <= Cross Site Request Forgery (CSRF) Vulnerability", "tags": ["Exploit"], "refsource": "MLIST"}, {"url": "http://securityreason.com/securityalert/8067", "name": "8067", "tags": [], "refsource": "SREASON"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change account privileges via an edit access_permissions action to index.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-352"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2011-0535", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2011-02-08T22:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:zikula:zikula_application_framework:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:zikula:zikula_application_framework:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:zikula:zikula_application_framework:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.2.4"}, {"cpe23Uri": "cpe:2.3:a:zikula:zikula_application_framework:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2011-09-22T03:28Z"}