Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-26296


In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.


Published

2021-02-19T09:15:13.283

Last Modified

2024-11-21T05:56:02.610

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

4.9

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-352
  • Type: Primary
    CWE-352

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache myfaces ≤ 2.2.13 Yes
Application apache myfaces ≤ 2.3.7 Yes
Application apache myfaces 2.3 Yes
Application apache myfaces 2.3 Yes
Application apache myfaces 2.3 Yes
Application apache myfaces 2.3 Yes
Application apache myfaces 3.0.0 Yes
Application netapp oncommand_insight - Yes

References