Security
Headlines
HeadlinesLatestCVEs

Tag

#csrf

AppleZeed CMS 2.0 SQL Injection

AppleZeed CMS version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox
Allhandsmarketing LMS 2.0 Cross Site Request Forgery

Allhandsmarketing LMS version 2.0 suffers from a cross site request forgery vulnerability.

CVE-2023-36162: ZZCMS-2023 has a CSRF vulnerability · Issue #6 · forget-code/zzcms

Cross Site Request Forgery vulnerability in ZZCMS v.2023 alows a remote attacker to gain privileges via the add function in adminlist.php.

CVE-2023-35935: Merge pull request from GHSA-g8x5-p9qc-cf95 · fastify/fastify-oauth2@bff756b

@fastify/oauth2, a wrapper around the `simple-oauth2` library, is vulnerable to cross site request forgery (CSRF) prior to version 7.2.0.. All versions of @fastify/oauth2 used a statically generated `state` parameter at startup time and were used across all requests for all users. The purpose of the Oauth2 `state` parameter is to prevent CSRF attacks. As such, it should be unique per user and should be connected to the user's session in some way that will allow the server to validate it. Version 7.2.0 changes the default behavior to store the `state` in a cookie with the `http-only` and `same-site=lax` attributes set. The state is now by default generated for every user. Note that this contains a breaking change in the `checkStateFunction` function, which now accepts the full `Request` object. There are no known workarounds for the issue.

XEL CMS 1.1 Cross Site Request Forgery

XEL CMS version 1.1 suffers from a cross site request forgery vulnerability.

CVE-2021-4399: Changeset 2478642 for edwiser-bridge – WordPress Plugin Repository

The Edwiser Bridge plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including,2.0.6. This is due to missing or incorrect nonce validation on the user_data_synchronization_initiater(), course_synchronization_initiater(), users_link_to_moodle_synchronization(), connection_test_initiater(), admin_menus(), and subscribe_handler() function. This makes it possible for unauthenticated attackers to perform unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.