TrueConf Server 4.3.7 /admin/service/stop/ cross-site request forgery
A vulnerability classified as problematic was found in TrueConf Server 4.3.7. This vulnerability affects unknown code of the file /admin/service/stop/. The manipulation leads to cross-site request forgery. Using CWE to declare the problem leads to CWE-352. The weakness was shared 01/29/2017 by LiquidWorm as EDB-ID 41184 as Exploit (Exploit-DB). The advisory is available at exploit-db.com. This vulnerability was named CVE-2017-20120. The attack can be initiated remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. It is declared as proof-of-concept. It is possible to download the exploit at exploit-db.com. As 0-day the estimated underground price was around $0-$5k. Upgrading to version 4.4.0 is able to address this issue. It is recommended to upgrade the affected component. A possible mitigation has been published even before and not after the disclosure of the vulnerability.