KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
References
Link | Resource |
---|---|
https://github.com/keystonejs/keystone/pull/4478 | Issue Tracking Third Party Advisory |
https://github.com/keystonejs/keystone/issues/4437 | Issue Tracking Third Party Advisory |
http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43922/ |
Configurations
Information
Published : 2017-11-06 00:29
Updated : 2018-01-30 18:29
NVD link : CVE-2017-16570
Mitre link : CVE-2017-16570
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
keystonejs
- keystone