Vulnerability Description
The email API in application/libraries/api/MY_Email_Api_Object.php in the Ushahidi Platform before 2.5 does not require authentication, which allows remote attackers to list, delete, or organize messages via a GET request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ushahidi | Ushahidi Platform | <= 2.4.1 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2012/08/09/5
- https://github.com/ushahidi/Ushahidi_Web/commit/4c24325ExploitPatch
- http://openwall.com/lists/oss-security/2012/08/09/5
- https://github.com/ushahidi/Ushahidi_Web/commit/4c24325ExploitPatch
FAQ
What is CVE-2012-3472?
CVE-2012-3472 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The email API in application/libraries/api/MY_Email_Api_Object.php in the Ushahidi Platform before 2.5 does not require authentication, which allows remote attackers to list, delete, or organize messa...
How severe is CVE-2012-3472?
CVE-2012-3472 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3472?
Check the references section above for vendor advisories and patch information. Affected products include: Ushahidi Ushahidi Platform.