{"api_version":"1","generated_at":"2026-04-10T22:30:40+00:00","cve":"CVE-2018-1000206","urls":{"html":"https://cve.report/CVE-2018-1000206","api":"https://cve.report/api/cve/CVE-2018-1000206.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1000206","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000206"},"summary":{"title":"CVE-2018-1000206","description":"JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-07-13 18:29:00","updated_at":"2019-06-03 18:52:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/","name":"https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Exploiting JSON Cross Site Request Forgery (CSRF) using Flash | Geekboy | Security Researcher","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581","name":"https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581","refsource":"CONFIRM","tags":["Release Notes","Vendor Advisory"],"title":"Release Notes - JFrog JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.jfrog.com/jira/browse/RTFACT-17004","name":"https://www.jfrog.com/jira/browse/RTFACT-17004","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Vendor Advisory"],"title":"[RTFACT-17004] CSRF vulnerability with flash redirect  - JFrog JIRA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1000206","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000206","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1000206","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jfrog","cpe5":"artifactory","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000206","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jfrog","cpe5":"artifactory","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-07-10T20:50:24.880837","DATE_REQUESTED":"2018-07-08T15:34:56","ID":"CVE-2018-1000206","REQUESTER":"art-dev@jfrog.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/","refsource":"MISC","url":"https://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/"},{"name":"https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581","refsource":"CONFIRM","url":"https://www.jfrog.com/jira/secure/ReleaseNote.jspa?projectId=10070&version=19581"},{"name":"https://www.jfrog.com/jira/browse/RTFACT-17004","refsource":"CONFIRM","url":"https://www.jfrog.com/jira/browse/RTFACT-17004"}]}},"nvd":{"publishedDate":"2018-07-13 18:29:00","lastModifiedDate":"2019-06-03 18:52:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*","versionStartIncluding":"5.11.0","versionEndExcluding":"6.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1000206","Ordinal":"130718","Title":"CVE-2018-1000206","CVE":"CVE-2018-1000206","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1000206","Ordinal":"1","NoteData":"JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash component. This vulnerability appears to have been fixed in 6.1.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1000206","Ordinal":"2","NoteData":"2018-07-13","Type":"Other","Title":"Published"}]}}}