
We found results for “”
WS-2022-0292
Good to know:

Date: June 26, 2022
It's possible to bypass the CSRF protection which is already implemented on the coreBOS CMS. When some request not contain any valid CSRF token, the webpage will be displayed an error. Looks like the csrf-magic.php / csrf-magic.js only checked the POST request and ignore the GET request.From this way, CSRF protection can be bypassed by removing the CSRF Token parameter and changing the request from POST to GET.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Cross-Site Request Forgery (CSRF)
CWE-352Top Fix

Upgrade Version
Upgrade to version https://github.com/tsolucio/corebos/commit/d0bf454f905355b10961d2925397c58e0f85eff9
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | NONE |