A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
References
Link | Resource |
---|---|
https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2 | Patch Third Party Advisory |
https://github.com/hs-web/hsweb-framework/issues/107 | Exploit Issue Tracking Third Party Advisory |
https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2 | Patch Third Party Advisory |
https://github.com/hs-web/hsweb-framework/issues/107 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2 - Patch, Third Party Advisory | |
References | () https://github.com/hs-web/hsweb-framework/issues/107 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2018-12-30 18:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20595
Mitre link : CVE-2018-20595
CVE.ORG link : CVE-2018-20595
JSON object : View
Products Affected
hsweb
- hsweb
CWE
CWE-352
Cross-Site Request Forgery (CSRF)