CVE-2024-24819
icingaweb2-module-incubator base implementation for HTML forms is susceptible to CSRF
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
icingaweb2-module-incubator is a working project of bleeding edge Icinga Web 2 libraries. In affected versions the class `gipfl\Web\Form` is the base for various concrete form implementations [1] and provides protection against cross site request forgery (CSRF) by default. This is done by automatically adding an element with a CSRF token to any form, unless explicitly disabled, but even if enabled, the CSRF token (sent during a client's submission of a form relying on it) is not validated. This enables attackers to perform changes on behalf of a user which, unknowingly, interacts with a prepared link or website. The version 0.22.0 is available to remedy this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.
icingaweb2-module-incubator es un proyecto de trabajo de las librerías Icinga Web 2 de última generación. En las versiones afectadas, la clase `gipfl\Web\Form` es la base para varias implementaciones de formularios concretos [1] y proporciona protección contra cross site request forgery (CSRF) de forma predeterminada. Esto se hace agregando automáticamente un elemento con un token CSRF a cualquier formulario, a menos que esté explícitamente deshabilitado, pero incluso si está habilitado, el token CSRF (enviado durante el envío de un formulario por parte de un cliente que depende de él) no se valida. Esto permite a los atacantes realizar cambios en nombre de un usuario que, sin saberlo, interactúa con un enlace o sitio web preparado. La versión 0.22.0 está disponible para solucionar este problema. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-01-31 CVE Reserved
- 2024-02-09 CVE Published
- 2024-02-17 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/Icinga/icingaweb2-module-incubator/security/advisories/GHSA-p8vv-9pqq-rm8p | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Icinga/icingaweb2-module-incubator/commit/db7dc49585fee0b4e96be666d7f6009a74a1ccb5 | 2024-02-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Icinga Search vendor "Icinga" | Icingaweb2-module-incubator Search vendor "Icinga" for product "Icingaweb2-module-incubator" | < 0.22.0 Search vendor "Icinga" for product "Icingaweb2-module-incubator" and version " < 0.22.0" | - |
Affected
|