GHSA-WHRH-9J4Q-G7PH
Vulnerability from github – Published: 2020-08-05 21:43 – Updated: 2021-09-23 18:38
VLAI?
Summary
CSRF Vulnerability in polaris-website
Details
Impact
CSRF vulnerability: In some very specific circumstances, an attacker would be able to update your settings. Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings.
Patches
As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.
For more information
If you have any questions or comments about this advisory: * Open an issue in Polaris-React * Email us at hi@nezto.re * Join our discord (preferred): https://discord.gg/QevWabU
Severity ?
6.8 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "polaris-website"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"github_reviewed": true,
"github_reviewed_at": "2020-08-05T21:42:25Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "### Impact\nCSRF vulnerability:\nIn some very specific circumstances, an attacker would be able to update your settings.\nBasically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn\u0027t check if it worked, nor could they read your settings.\n\n### Patches\nAs of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react)\n* Email us at [hi@nezto.re](mailto:hi@nezto.re)\n* Join our discord (preferred): https://discord.gg/QevWabU",
"id": "GHSA-whrh-9j4q-g7ph",
"modified": "2021-09-23T18:38:11Z",
"published": "2020-08-05T21:43:19Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph"
},
{
"type": "WEB",
"url": "https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b"
},
{
"type": "PACKAGE",
"url": "https://github.com/polaris-rbx/Polaris-React"
},
{
"type": "WEB",
"url": "https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f"
},
{
"type": "WEB",
"url": "https://owasp.org/www-community/attacks/csrf"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473"
},
{
"type": "WEB",
"url": "https://www.barracuda.com/glossary/csrf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "CSRF Vulnerability in polaris-website"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…