Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c93p-x52p-5f64

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php.

PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php.

EPSS

Процентиль: 43%
0.00205
Низкий

Дефекты

CWE-352

Связанные уязвимости

nvd
больше 16 лет назад

PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php.

EPSS

Процентиль: 43%
0.00205
Низкий

Дефекты

CWE-352