Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f64v-mwpx-gv6x

Опубликовано: 20 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

A Cross-Site Request Forgery (CSRF) vulnerability in version v1.4.1 of danswer-ai/danswer allows attackers to perform unauthorized actions in the context of the victim's browser. This includes connecting the victim's application with a malicious Slack Bot, inviting users, and deleting chats, among other actions. The application does not implement any CSRF protection, making it susceptible to these attacks.

A Cross-Site Request Forgery (CSRF) vulnerability in version v1.4.1 of danswer-ai/danswer allows attackers to perform unauthorized actions in the context of the victim's browser. This includes connecting the victim's application with a malicious Slack Bot, inviting users, and deleting chats, among other actions. The application does not implement any CSRF protection, making it susceptible to these attacks.

EPSS

Процентиль: 7%
0.00028
Низкий

8.1 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.1
nvd
11 месяцев назад

A Cross-Site Request Forgery (CSRF) vulnerability in version v1.4.1 of danswer-ai/danswer allows attackers to perform unauthorized actions in the context of the victim's browser. This includes connecting the victim's application with a malicious Slack Bot, inviting users, and deleting chats, among other actions. The application does not implement any CSRF protection, making it susceptible to these attacks.

EPSS

Процентиль: 7%
0.00028
Низкий

8.1 High

CVSS3

Дефекты

CWE-352