Описание
Cross-Site Request Forgery (CSRF) in keystone
Versions of keystone prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the X-CSRF-Token header, which may allow attackers to carry actions on behalf of other users on all endpoints.
Recommendation
Update to version 4.0.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-16570
- https://github.com/keystonejs/keystone/issues/4437
- https://github.com/keystonejs/keystone/pull/4478
- https://github.com/advisories/GHSA-q43c-g2g7-6gxj
- https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf
- https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663
- https://www.exploit-db.com/exploits/43922
- https://www.npmjs.com/advisories/979
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report
Пакеты
Наименование
keystone
npm
Затронутые версииВерсия исправления
<= 4.0.0-beta.6
4.0.0-beta.7
Связанные уязвимости
CVSS3: 8.8
nvd
больше 8 лет назад
KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.