CVE-2017-16570

KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
Configurations

Configuration 1 (hide)

cpe:2.3:a:keystonejs:keystone:*:beta7:*:*:*:*:*:*

History

21 Nov 2024, 03:16

Type Values Removed Values Added
References () http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ - Issue Tracking, Third Party Advisory () http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ - Issue Tracking, Third Party Advisory
References () https://github.com/keystonejs/keystone/issues/4437 - Issue Tracking, Third Party Advisory () https://github.com/keystonejs/keystone/issues/4437 - Issue Tracking, Third Party Advisory
References () https://github.com/keystonejs/keystone/pull/4478 - Issue Tracking, Third Party Advisory () https://github.com/keystonejs/keystone/pull/4478 - Issue Tracking, Third Party Advisory
References () https://www.exploit-db.com/exploits/43922/ - () https://www.exploit-db.com/exploits/43922/ -

Information

Published : 2017-11-06 08:29

Updated : 2024-11-21 03:16


NVD link : CVE-2017-16570

Mitre link : CVE-2017-16570

CVE.ORG link : CVE-2017-16570


JSON object : View

Products Affected

keystonejs

  • keystone
CWE
CWE-352

Cross-Site Request Forgery (CSRF)