Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

BID:25921

Info

Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

Bugtraq ID: 25921
Class: Design Error
CVE: CVE-2007-5229
Remote: Yes
Local: No
Published: Oct 04 2007 12:00AM
Updated: May 07 2015 05:35PM
Credit: David Kierznowski is credited with the discovery of this vulnerability.
Vulnerable: Google FeedBurner FeedSmith 2.2
Not Vulnerable: Google FeedBurner FeedSmith 2.3

Discussion

Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

FeedBurner FeedSmith is prone to a cross-site request-forgery vulnerability.

Exploiting this issue may allow a remote attacker to use a victim's currently active session to perform actions with the application.

This issue affects FeedBurner FeedSmith 2.2; other versions may also be affected.

Exploit / POC

Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.

The following exploit code is available:

Solution / Fix

Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

Solution:
The vendor has released FeedSmith 2.3 to address this issue; please see the references for details.


Google FeedBurner FeedSmith 2.2

References

Google FeedBurner FeedSmith Cross-Site Request Forgery Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report