{"containers":{"cna":{"affected":[{"product":"CMS","vendor":"Elefant","versions":[{"status":"affected","version":"1.3.12-RC"}]}],"credits":[{"lang":"en","value":"Tim Coen"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-20T04:50:32.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Feb/37"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97259"}],"title":"Elefant CMS cross-site request forgery","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20062","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Elefant CMS cross-site request forgery"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"CMS","version":{"version_data":[{"version_value":"1.3.12-RC"}]}}]},"vendor_name":"Elefant"}]}},"credit":"Tim Coen","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"5.0","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Feb/37","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Feb/37"},{"name":"https://vuldb.com/?id.97259","refsource":"MISC","url":"https://vuldb.com/?id.97259"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.294Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Feb/37"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97259"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:10:32.518003Z","id":"CVE-2017-20062","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:19:28.944Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20062","datePublished":"2022-06-20T04:50:33.000Z","dateReserved":"2022-06-18T00:00:00.000Z","dateUpdated":"2025-04-15T14:19:28.944Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}