CVE-2017-14956
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
18/10/2017
Last modified:
20/04/2025
Description
AlienVault USM v5.4.2 and earlier offers authenticated users the functionality of exporting generated reports via the "/ossim/report/wizard_email.php" script. Besides offering an export via a local download, the script also offers the possibility to send out any report via email to a given address (either in PDF or XLS format). Since there is no anti-CSRF token protecting this functionality, it is vulnerable to Cross-Site Request Forgery attacks.
Impact
Base Score 3.x
5.70
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:* | 5.4.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/144617/AlienVault-USM-5.4.2-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2017/Oct/32
- http://www.securityfocus.com/archive/1/541342/100/0/threaded
- http://www.securityfocus.com/bid/101284
- https://www.exploit-db.com/exploits/42988/
- https://www.rcesecurity.com/2017/10/cve-2017-14956-alienvault-usm-leaks-sensitive-compliance-information-via-csrf/
- http://packetstormsecurity.com/files/144617/AlienVault-USM-5.4.2-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2017/Oct/32
- http://www.securityfocus.com/archive/1/541342/100/0/threaded
- http://www.securityfocus.com/bid/101284
- https://www.exploit-db.com/exploits/42988/
- https://www.rcesecurity.com/2017/10/cve-2017-14956-alienvault-usm-leaks-sensitive-compliance-information-via-csrf/



