Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rhvc-x32h-5526

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью

Описание

No CSRF Validation in droppy

Affected versions of droppy are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others.

Recommendation

Update to version 3.5.0 or later.

Пакеты

Наименование

droppy

npm
Затронутые версииВерсия исправления

< 3.5.0

3.5.0

EPSS

Процентиль: 33%
0.00134
Низкий

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
nvd
больше 7 лет назад

Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.

EPSS

Процентиль: 33%
0.00134
Низкий

Дефекты

CWE-352