Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-36622: Added CSRF prevention · sah-comp/bienlein@d7836a4

A vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability.

CVE
#csrf#vulnerability#auth

@@ -35,22 +35,24 @@ public function index() session_start(); Auth::check(); $this->template = 'account/index’;
if (Flight::request()->method == ‘POST’) { if (! Model::validateCSRFToken(Flight::request()->data->token)) { $this->redirect(“/logout”); } Flight::get(‘user’)->import(Flight::request()->data->dialog); try { R::store(Flight::get(‘user’)); Flight::get(‘user’)->notify(I18n::__(‘account_edit_success’), ‘success’); $this->redirect(‘/account/’); } catch (Exception $e) { } catch (Exception $e) { Flight::get(‘user’)->notify(I18n::__(‘account_edit_failure’), ‘error’); } } }
$this->render(); }
/** * Displays a page to change the password. * @@ -62,8 +64,11 @@ public function changepassword() session_start(); Auth::check(); $this->template = 'account/changepassword’;
if (Flight::request()->method == ‘POST’) { if (! Model::validateCSRFToken(Flight::request()->data->token)) { $this->redirect(“/logout”); } if (Flight::get(‘user’)->changePassword( Flight::request()->data->pw, Flight::request()->data->pw_new, @@ -73,35 +78,33 @@ public function changepassword() R::store(Flight::get(‘user’)); Flight::get(‘user’)->notify(I18n::__(‘account_changepassword_success’), ‘success’); $this->redirect(‘/account/’); } catch (Exception $e) { } catch (Exception $e) { //Whoops, what nu? } } else { } else { Flight::get(‘user’)->notify(I18n::__(‘account_changepassword_failure’), ‘error’); } } }
$this->render(); }
/** * Renders the account page. */ protected function render() { Flight::render('shared/notification’, array(), ‘notification’); // Flight::render('shared/notification’, array(), ‘notification’); // Flight::render('shared/navigation/account’, array(), ‘navigation_account’); Flight::render('shared/navigation/main’, array(), ‘navigation_main’); Flight::render('shared/navigation/main’, array(), ‘navigation_main’); Flight::render('shared/navigation’, array(), ‘navigation’); Flight::render('account/toolbar’, array(), ‘toolbar’); Flight::render('shared/header’, array(), ‘header’); Flight::render('shared/footer’, array(), ‘footer’); Flight::render($this->template, array( ‘record’ => Flight::get(‘user’) ), ‘content’); Flight::render('shared/header’, array(), ‘header’); Flight::render('shared/footer’, array(), ‘footer’); Flight::render($this->template, array( ‘record’ => Flight::get(‘user’) ), ‘content’); Flight::render('html5’, array( ‘title’ => I18n::__(“account_head_title”), ‘language’ => Flight::get(‘language’)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda