Skip to content

Destructive actions (including administrative ones) are not run via POST with CSRF

Critical
Alanaktion published GHSA-3xfh-h685-w25m Sep 10, 2021 · 1 comment

Package

No package listed

Affected versions

< 1.7.10

Patched versions

1.7.10

Description

Impact

Before version 1.7.10, an attacker is able to make arbitrary changes to many components including issues, comments, files, users, and groups via a CSRF attack. This includes all administrative actions if the targeted user is an administrator.

Patches

Phproject 1.7.10 includes new CSRF protection on all web-based POST requests that prevents this type of attack.

Workarounds

None. This update should be non-breaking for typical use, so it is strongly recommended to install the 1.7.10 update to fix the issue.

References

Related disclosures

For more information

If you have any questions or comments about this advisory:

Severity

Critical
9.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE ID

No known CVE

Weaknesses