In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.
2021-02-19T09:15:13.283
2024-11-21T05:56:02.610
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | myfaces | ≤ 2.2.13 | Yes |
Application | apache | myfaces | ≤ 2.3.7 | Yes |
Application | apache | myfaces | 2.3 | Yes |
Application | apache | myfaces | 2.3 | Yes |
Application | apache | myfaces | 2.3 | Yes |
Application | apache | myfaces | 2.3 | Yes |
Application | apache | myfaces | 3.0.0 | Yes |
Application | netapp | oncommand_insight | - | Yes |