Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-5pm7-cp8f-p2c2: wallabag/wallabag Has Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities

Impact

wallabag versions prior to 2.6.11 were discovered to contain multiple Cross-Site Request Forgery (CSRF) vulnerabilities across several endpoints. An attacker could craft a malicious link or page that, if visited by a logged-in wallabag user, could trick the user’s browser into performing unintended actions within their wallabag account without their consent. Additionally, one endpoint affects the login page locale setting.

The affected endpoints allow attackers to potentially perform actions such as:

  • Manage API Tokens:
    • /generate-token
    • /revoke-token
  • Manage User Rules:
    • /tagging-rule/delete/{taggingRule}
    • /ignore-origin-user-rule/delete/{ignoreOriginUserRule}
  • Modify User Configuration:
    • /config/view-mode
  • Manage Individual Entries:
    • /reload/{id}
    • /archive/{id}
    • /star/{id}
    • /delete/{id}
    • /share/{id}
    • /share/delete/{id}
  • Manage Tags:
    • /remove-tag/{entry}/{tag}
    • /tag/search/{filter}
    • /tag/delete/{slug}
  • Perform Bulk Actions:
    • /mass
  • Change Interface Language (Login Page):
    • /locale/{language}

Successfully exploiting these vulnerabilities could lead to unauthorized modification or deletion of user data, configuration changes, token manipulation, or interface changes, depending on the specific endpoint targeted.

This set of vulnerabilities has an aggregated CVSS v3.1 score of 4.3 (Medium).

Users are strongly advised to upgrade their wallabag instance to version 2.6.11 or later to mitigate these vulnerabilities.

Resolution

These vulnerabilities have been addressed in wallabag version 2.6.11. The affected endpoints have been modified to require the HTTP POST method along with a valid CSRF token for state-changing actions, preventing attackers from forcing users’ browsers to perform these actions unintentionally.

Credits

Found, reported and fixed by @yguedidi

ghsa
#csrf#vulnerability#auth

Impact

wallabag versions prior to 2.6.11 were discovered to contain multiple Cross-Site Request Forgery (CSRF) vulnerabilities across several endpoints. An attacker could craft a malicious link or page that, if visited by a logged-in wallabag user, could trick the user’s browser into performing unintended actions within their wallabag account without their consent. Additionally, one endpoint affects the login page locale setting.

The affected endpoints allow attackers to potentially perform actions such as:

  • Manage API Tokens:
    • /generate-token
    • /revoke-token
  • Manage User Rules:
    • /tagging-rule/delete/{taggingRule}
    • /ignore-origin-user-rule/delete/{ignoreOriginUserRule}
  • Modify User Configuration:
    • /config/view-mode
  • Manage Individual Entries:
    • /reload/{id}
    • /archive/{id}
    • /star/{id}
    • /delete/{id}
    • /share/{id}
    • /share/delete/{id}
  • Manage Tags:
    • /remove-tag/{entry}/{tag}
    • /tag/search/{filter}
    • /tag/delete/{slug}
  • Perform Bulk Actions:
    • /mass
  • Change Interface Language (Login Page):
    • /locale/{language}

Successfully exploiting these vulnerabilities could lead to unauthorized modification or deletion of user data, configuration changes, token manipulation, or interface changes, depending on the specific endpoint targeted.

This set of vulnerabilities has an aggregated CVSS v3.1 score of 4.3 (Medium).

Users are strongly advised to upgrade their wallabag instance to version 2.6.11 or later to mitigate these vulnerabilities.

Resolution

These vulnerabilities have been addressed in wallabag version 2.6.11. The affected endpoints have been modified to require the HTTP POST method along with a valid CSRF token for state-changing actions, preventing attackers from forcing users’ browsers to perform these actions unintentionally.

Credits

Found, reported and fixed by @yguedidi

References

  • GHSA-5pm7-cp8f-p2c2
  • wallabag/wallabag@edffef8
  • wallabag/wallabag@ed1acf5
  • wallabag/wallabag@eb8408b
  • wallabag/wallabag@e162408
  • wallabag/wallabag@ddf2e80
  • wallabag/wallabag@d703fa6
  • wallabag/wallabag@d1e1289
  • wallabag/wallabag@cf49be6
  • wallabag/wallabag@ac5b5fb
  • wallabag/wallabag@99c8a06
  • wallabag/wallabag@6fa61c0
  • wallabag/wallabag@677b298
  • wallabag/wallabag@5ea5115
  • wallabag/wallabag@3817010
  • wallabag/wallabag@27f0d94
  • wallabag/wallabag@264f911
  • wallabag/wallabag@0d8429d
  • wallabag/wallabag@00d0e6f

ghsa: Latest News

GHSA-9fwj-9mjf-rhj3: laravel-auth0 SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions