Show plain JSON{"id": "CVE-2013-2754", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-03-11T19:37:01.927", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0029.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/93104", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/121564/UMI.CMS-2.9-Cross-Site-Request-Forgery.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.exploit-db.com/exploits/25449", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://www.htbridge.com/advisory/HTB23151", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2013-05/0029.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/93104", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/121564/UMI.CMS-2.9-Cross-Site-Request-Forgery.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/25449", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.htbridge.com/advisory/HTB23151", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Umisoft UMI.CMS before 2.9 build 21905 allows remote attackers to hijack the authentication of administrators for requests that add administrator accounts via a request to admin/users/add/user/do/."}, {"lang": "es", "value": "Vulnerabilidad de CSRF en Umisoft UMI.CMS anterior a 2.9 build 21905 permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que a\u00f1aden cuentas de administrador a trav\u00e9s de una solicitud hacia admin/users/add/user/do/."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:umi-cms:umi.cms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C1E3132-BA50-4B4E-BBEC-6FD84BE42392", "versionEndIncluding": "2.9"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.3.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E21DD334-8600-4CB5-8B34-2197A54816E5"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12CCF341-63FB-4986-9DC0-D676F2536080"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D194B13-3A54-49A4-96CF-3A332B6B7D0C"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BD6DFF1-DC72-486A-817F-6C9436F35B5C"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4DF1B81-BCD1-42F9-8E08-44E0FA219688"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FE679D0-83ED-4027-8CE6-623CDBE7F9FF"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DACCA120-EA77-42D7-A834-230778863E3D"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5408448-DE6A-4553-BA42-8F0A0851793B"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B0DDF0B-9F93-4768-A8FC-D477B463A07F"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95FB631E-293C-4CF4-90DD-AB9E8EE8AF14"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CDEB52E-2C0F-45A8-82A5-7EA722042618"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DB74B23-9EAE-44E7-AEF3-881AF2CC3716"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF8A2F71-B62A-4ACD-8CBF-8A564E0A7321"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02D8130F-7DA4-445F-8B16-169AE5666FF6"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70EC0206-D8E2-4168-92F4-726858395F7B"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EFFFECD-9589-4061-BC4E-D13C8F7FF9EB"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "258BCE4D-A6EF-49D6-A3DF-74BE0503541A"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD2F2A20-FD93-4977-BE4F-35C0E3B0200E"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DB93F84-A9BD-498E-BB9F-E615B823B326"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C06B5B4-894E-48C7-8768-7BBFD04F1E94"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4822E563-2709-4CE5-9094-4AA34BE289BE"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0AF1C6-B677-4F84-BC04-73421A98EE92"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5036A0A1-AA3E-4CD1-8187-E65C441A01C4"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AE1F115-969E-48DF-BD06-6F09293058CD"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "642C8F02-FE74-4EF1-8169-E56137A2E1E3"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F24162D5-DAB4-4008-9E36-753C930D9E44"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DE1777B-601B-4101-9A48-39EC4AEA19D6"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51162941-DE77-4C3A-ADF6-458B0EAC37F4"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A16283C4-721B-4800-BC4C-CD205D20AAAE"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D834A2-2343-4009-B9DB-D8B606C5A38A"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4E69BCC-8893-49B4-ADC0-AE3003E98AC6"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF987849-4BED-4E17-AE00-D091689239E1"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C405ABB6-F23D-4315-B22F-42BEFC3DC7B1"}, {"criteria": "cpe:2.3:a:umi-cms:umi.cms:2.8.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B5C63F8-214E-4970-8114-B9E8949E0375"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}