GHSA-4j8w-p6hv-3qxc
GHSA-4j8w-p6hv-3qxc
This commit is contained in:
advisory-database[bot] 2023-12-29 19:36:27 +00:00
Родитель ae6e7eb0e9
Коммит 4cf8d4bdde
2 изменённых файлов: 69 добавлений и 46 удалений

Просмотреть файл

@ -0,0 +1,69 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4j8w-p6hv-3qxc",
"modified": "2023-12-29T19:35:01Z",
"published": "2023-12-21T18:30:23Z",
"aliases": [
"CVE-2023-7038"
],
"summary": "Cross-Site Request Forgery (CSRF) in automad/automad",
"details": "automad up to 1.10.9 does not implement anti-CSRF tokens by default, making it vulnerable Cross-Site Request Forgery (CSRF). An attacker may exploit this vulnerability to force an admin into creating or deleting users. An exploit has been disclosed publicly.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "automad/automad"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.10.9"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7038"
},
{
"type": "PACKAGE",
"url": "https://github.com/marcantondahmen/automad"
},
{
"type": "WEB",
"url": "https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF)"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.248687"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.248687"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2023-12-29T19:35:01Z",
"nvd_published_at": "2023-12-21T18:15:08Z"
}
}

Просмотреть файл

@ -1,46 +0,0 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4j8w-p6hv-3qxc",
"modified": "2023-12-21T18:30:23Z",
"published": "2023-12-21T18:30:23Z",
"aliases": [
"CVE-2023-7038"
],
"details": "A vulnerability was found in automad up to 1.10.9. It has been rated as problematic. This issue affects some unknown processing of the file /dashboard?controller=UserCollection::createUser of the component User Creation Handler. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
}
],
"affected": [
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7038"
},
{
"type": "WEB",
"url": "https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF)"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.248687"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.248687"
}
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-12-21T18:15:08Z"
}
}