Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2011-0748
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple cross-site request forgery (CSRF) vulnerabilities in phpList before 2.10.13 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) edit administrator accounts..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:tincan:phplist:2.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.9.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.9.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.9.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.5b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.4.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.4b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.9.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.2b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.1.3b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:1.3.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.5.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.10.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://int21.de/cve/CVE-2011-0748-phplist.html
- http://www.phplist.com/?lid=516
- http://secunia.com/advisories/44041
- http://securityreason.com/securityalert/8199
- http://www.exploit-db.com/exploits/18419
- http://osvdb.org/78549
- http://www.securityfocus.com/bid/51681
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72746
- http://www.securityfocus.com/archive/1/517400/100/0/threaded