Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7mf6-c4gc-7p3h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

EPSS

Процентиль: 31%
0.00121
Низкий

Дефекты

CWE-352

Связанные уязвимости

nvd
почти 14 лет назад

The cross-site request forgery (CSRF) protection mechanism in e107 before 0.7.23 uses a predictable random token based on the creation date of the administrator account, which allows remote attackers to hijack the authentication of administrators for requests that add new users via e107_admin/users.php.

EPSS

Процентиль: 31%
0.00121
Низкий

Дефекты

CWE-352