KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
References
Link | Resource |
---|---|
http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ | Issue Tracking Third Party Advisory |
https://github.com/keystonejs/keystone/issues/4437 | Issue Tracking Third Party Advisory |
https://github.com/keystonejs/keystone/pull/4478 | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43922/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-06T08:00:00
Updated: 2018-01-30T10:57:01
Reserved: 2017-11-06T00:00:00
Link: CVE-2017-16570
JSON object: View
NVD Information
Status : Modified
Published: 2017-11-06T08:29:00.377
Modified: 2018-01-31T02:29:00.967
Link: CVE-2017-16570
JSON object: View
Redhat Information
No data.
CWE