CVE-2021-45785
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
TruDesk Help Desk/Ticketing Solution v1.1.11 is vulnerable to a Cross-Site Request Forgery (CSRF) attack which would allow an attacker to restart the server, causing a DoS attack. The attacker must craft a webpage that would perform a GET request to the /api/v1/admin/restart endpoint, then the victim (who has sufficient privileges), would visit the page and the server restart would begin. The attacker must know the full URL that TruDesk is on in order to craft the webpage.
TruDesk Help Desk/Ticketing Solution v1.1.11 es vulnerable a un ataque de Cross-Site Request Forgery (CSRF) que permitiría a un atacante reiniciar el servidor, provocando un ataque DoS. El atacante debe crear una página web que realice una solicitud GET al endpoint /api/v1/admin/restart, luego la víctima (que tiene privilegios suficientes) visitará la página y comenzará el reinicio del servidor. El atacante debe conocer la URL completa en la que se encuentra TruDesk para poder crear la página web.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-12-27 CVE Reserved
- 2024-06-24 CVE Published
- 2024-06-27 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://1d8.github.io/cves/cve_2021_45785 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trudesk Project Search vendor "Trudesk Project" | Trudesk Search vendor "Trudesk Project" for product "Trudesk" | 1.1.11 Search vendor "Trudesk Project" for product "Trudesk" and version "1.1.11" | - |
Affected
|