Files
CVEs-PoC/2016/CVE-2016-9127.md
T
2025-09-29 21:09:30 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2016-9127](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9127)
![](https://img.shields.io/static/v1?label=Product&message=Revive%20Adserver%20All%20versions%20before%203.2.3&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Revive%20Adserver%20All%20versions%20before%203.2.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)&color=brightgreen)
### Description
Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). The password recovery form in Revive Adserver is vulnerable to CSRF attacks. This vulnerability could be exploited to send a large number of password recovery emails to the registered users, especially in conjunction with a bug that caused recovery emails to be sent to all the users at once. Both issues have been fixed.
### POC
#### Reference
- https://www.revive-adserver.com/security/revive-sa-2016-001/
#### Github
No PoCs found on GitHub currently.