2 results (0.001 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The csrf_callback function in the CSRF Magic library through 2016-03-27 is vulnerable to CSRF protection bypass as it allows one to tamper with the csrf token values. A remote attacker can exploit this by crafting a malicious page and dispersing it to a victim via social engineering, enticing them to click the link. Once the user/victim clicks the "try again" button, the attacker can take over the account and perform unintended actions on the victim's behalf. NOTE: A third-party maintainer has stated that this CVE is a false report. They state that the csrf_callback function is actually a callback function to the callers own handler for output. • https://pastebin.com/01tDgq7u • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

In csrf-magic before 1.0.4, if $GLOBALS['csrf']['secret'] is not configured, the Anti-CSRF Token used is predictable and would permit an attacker to bypass the CSRF protections, because an automatically generated secret is not used. En csrf-magic en versiones anteriores a la 1.0.4, si $GLOBALS['csrf']['secret'] no está configurado, el token Anti-CSRF empleado es predecible y permitiría que un atacante omita las protecciones CSRF. Esto se debe a que no se emplea un secreto generado automáticamente. • http://csrf.htmlpurifier.org/news/2013/0717-1.0.4-released http://repo.or.cz/csrf-magic.git/blob/HEAD:/NEWS.txt http://repo.or.cz/csrf-magic.git/commit/9d2537f70d58b16aeba89779aaf1573b8d618e11 • CWE-352: Cross-Site Request Forgery (CSRF) •