// For flags

CVE-2023-45670

Frigate cross-site request forgery in `config_save` and `config_set` request handlers

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, the `config/save` and `config/set` endpoints of Frigate do not implement any CSRF protection. This makes it possible for a request sourced from another site to update the configuration of the Frigate server (e.g. via "drive-by" attack). Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. This issue can lead to arbitrary configuration updates for the Frigate server, resulting in denial of service and possible data exfiltration. Version 0.13.0 Beta 3 contains a patch.

Frigate es una grabadora de vídeo en red de código abierto. Antes de la versión 0.13.0 Beta 3, los endpoints `config/save` y `config/set` de Frigate no implementan ninguna protección CSRF. Esto hace posible que una solicitud procedente de otro sitio actualice la configuración del servidor Frigate (por ejemplo, mediante un ataque "drive-by"). Explotar esta vulnerabilidad requiere que el atacante conozca información muy específica sobre el servidor Frigate de un usuario y requiere que se engañe a un usuario autenticado para que haga clic en un enlace especialmente manipulado a su instancia de Frigate. Esta vulnerabilidad podría ser aprovechada por un atacante en las siguientes circunstancias: Fragata expuesta públicamente a Internet (incluso con autenticación); el atacante conoce la dirección de la instancia de Frigate de un usuario; el atacante crea una página especializada que enlaza con la instancia de Frigate del usuario; El atacante encuentra una manera de lograr que un usuario autenticado visite su página especializada y haga clic en el botón/enlace. Este problema puede provocar actualizaciones de configuración arbitrarias para el servidor Frigate, lo que resulta en denegación de servicio y posible filtración de datos. La versión 0.13.0 Beta 3 contiene un parche.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-10 CVE Reserved
  • 2023-10-30 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-11-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Frigate
Search vendor "Frigate"
Frigate
Search vendor "Frigate" for product "Frigate"
<= 0.13.0
Search vendor "Frigate" for product "Frigate" and version " <= 0.13.0"
-
Affected
Frigate
Search vendor "Frigate"
Frigate
Search vendor "Frigate" for product "Frigate"
0.13.0
Search vendor "Frigate" for product "Frigate" and version "0.13.0"
beta1
Affected
Frigate
Search vendor "Frigate"
Frigate
Search vendor "Frigate" for product "Frigate"
0.13.0
Search vendor "Frigate" for product "Frigate" and version "0.13.0"
beta2
Affected