Vulnerability Note VU#555668

JAMF Software Casper Suite contains a cross-site request forgery vulnerability

Original Release date: 24 Sep 2012 | Last revised: 25 Sep 2012


JAMF Software's Casper Suite is susceptible to a cross-site request forgery (CSRF) (CWE-352) vulnerability.


JAMF Software's Casper Suite, a Mac OS X and iOS client management framework, contains a cross-site request forgery (CSRF) (CWE-352) vulnerability. The reporter provided a proof-of-concept that created a new user and modified the password for an existing user.


By convincing the user to follow a specifically crafted URL, an attacker may be able to execute commands in the context of the logged in user.


Apply an Update

Casper Suite 8.61 has been released to address this vulnerability. Users should contact JAMF Software to obtain this version.

If you cannot update for whatever reason, please consider the following workarounds.

Do not click on links

Do not follow links from emails or instant messages. Always access the management interface by typing in the web address or using a known good bookmark.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the site using stolen credentials from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
JAMF softwareAffected15 Aug 201224 Sep 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.8 E:POC/RL:W/RC:C
Environmental 5.8 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND



Thanks to Jacob Holcomb for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-4051
  • Date Public: 24 Sep 2012
  • Date First Published: 24 Sep 2012
  • Date Last Updated: 25 Sep 2012
  • Document Revision: 21


If you have feedback, comments, or additional information about this vulnerability, please send us email.