Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106321
Category:Web application abuses
Title:Revive Adserver Multiple Vulnerabilities
Summary:Revive Adserver is prone to multiple vulnerabilities.
Description:Summary:
Revive Adserver is prone to multiple vulnerabilities.

Vulnerability Insight:
Revive Adserver is prone to multiple vulnerabilities:

- The login page of Revive Adserver is vulnerable to password-guessing attacks. An account lockdown feature was
considered, but rejected to avoid introducing service disruptions to regular users during such attacks. A random
delay has instead been introduced as a counter-measure in case of password failures, along with a system to
discourage parallel brute forcing. These systems will effectively allow the valid users to log in to the
adserver, even while an attack is in progress.

- Revive Adserver is vulnerable to session fixation, by allowing arbitrary session identifiers to be forced and,
at the same time, by not invalidating the existing session upon a successful authentication. An attacker may steal
an authenticated sessions.

- Usernames are not properly escaped when displayed in the audit trail widget of the dashboard upon login,
allowing persistent XSS attacks. An authenticated user with enough privileges to create other users could
exploit the vulnerability to access the administrator account.

- The password recovery form in Revive Adserver is vulnerable to CSRF attacks. This vulnerability could be
exploited to send a large number of password recovery emails to the registered users, especially in conjunction
with a bug that caused recovery emails to be sent to all the users at once.

- The affiliate-preview.php script in www/admin is vulnerable to a reflected XSS attack. This vulnerability
could be used by an attacker to steal the session ID of an authenticated user, by tricking them into visiting a
specifically crafted URL.

- It is possible to check whether or not an email address is associated to one or more user accounts on a target
Revive Adserver instance by examining the message printed by the password recovery system.

- Two vectors for persistent XSS attacks via the Revive Adserver user interface, both requiring a trusted
(non-admin) account: the website name isn't properly escaped when displayed in the campaign-zone.php script and
the banner image URL for external banners isn't properly escaped when displayed in most of the banner related
pages.

- A number of scripts in Revive Adserver's user interface are vulnerable to CSRF attacks.

- Multiple CSRF vulnerabilities were found.

- www/admin/stats.php is vulnerable to reflected XSS attacks via multiple parameters that are not properly
sanitised or escaped when displayed, such as 'setPerPage', 'pageId', 'bannerid', 'pereiod_start', 'period_end'
and possibly others.

Affected Software/OS:
Revive Adserver version 3.2.2 and prior.

Solution:
Upgrade to version 3.2.3 or later

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-9124
https://github.com/revive-adserver/revive-adserver/commit/847941390f5b3310d51b07c92ec91cc1f4cc82c9
https://hackerone.com/reports/96115
https://www.revive-adserver.com/security/revive-sa-2016-001/
Common Vulnerability Exposure (CVE) ID: CVE-2016-9125
https://github.com/revive-adserver/revive-adserver/commit/4910365631eabbb208961c36149f41cc8159fb39
https://hackerone.com/reports/93809
https://hackerone.com/reports/93813
Common Vulnerability Exposure (CVE) ID: CVE-2016-9126
https://github.com/revive-adserver/revive-adserver/commit/8d8c6df309ff5fde9dd4770abcd4ec5d2449b3ec
https://hackerone.com/reports/97073
Common Vulnerability Exposure (CVE) ID: CVE-2016-9127
https://github.com/revive-adserver/revive-adserver/commit/3aaebcc765797d2c684e031f2836e0a69d6b7bc2
https://hackerone.com/reports/99452
Common Vulnerability Exposure (CVE) ID: CVE-2016-9128
https://github.com/revive-adserver/revive-adserver/commit/a323fd626627e8d42819fd5b7e2829196b5c54a3
https://github.com/revive-adserver/revive-adserver/commit/e17a7ec3412ded751cda50b82338de471d656d74
https://hackerone.com/reports/99004
Common Vulnerability Exposure (CVE) ID: CVE-2016-9129
https://github.com/revive-adserver/revive-adserver/commit/38223a841190bebd7a137c7bed84fbbcb2b0c2a5
https://hackerone.com/reports/98612
Common Vulnerability Exposure (CVE) ID: CVE-2016-9130
https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83
Common Vulnerability Exposure (CVE) ID: CVE-2016-9454
BugTraq ID: 83964
http://www.securityfocus.com/bid/83964
Common Vulnerability Exposure (CVE) ID: CVE-2016-9455
https://github.com/revive-adserver/revive-adserver/commit/65a9c8119b4bc7493fd957e1a8d6f6f731298b45
https://hackerone.com/reports/97123
Common Vulnerability Exposure (CVE) ID: CVE-2016-9456
https://github.com/revive-adserver/revive-adserver/commit/e563ca61e4f3b7210cb61f53284adaa8aef4a49a
Common Vulnerability Exposure (CVE) ID: CVE-2016-9457
https://github.com/revive-adserver/revive-adserver/commit/ecbe822b48ef4ff61c2c6357c0c94199a81946f4
https://hackerone.com/reports/107879
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.