icon

We found results for “

WS-2022-0292

Good to know:

icon

Date: June 26, 2022

It's possible to bypass the CSRF protection which is already implemented on the coreBOS CMS. When some request not contain any valid CSRF token, the webpage will be displayed an error. Looks like the csrf-magic.php / csrf-magic.js only checked the POST request and ignore the GET request.From this way, CSRF protection can be bypassed by removing the CSRF Token parameter and changing the request from POST to GET.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Cross-Site Request Forgery (CSRF)

CWE-352

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/tsolucio/corebos/commit/d0bf454f905355b10961d2925397c58e0f85eff9

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us