Lucene search

K
githubGitHub Advisory DatabaseGHSA-65V7-WG35-2QPM
HistoryMay 29, 2024 - 6:50 p.m.

Sylius Resource Bundle Cross-Site Request Forgery vulnerability

2024-05-2918:50:22
CWE-352
GitHub Advisory Database
github.com
4
sylius
cross-site request forgery
vulnerability
adminbundle
resourcebundle
fixed
csrf token
api context

6.9 Medium

AI Score

Confidence

Low

Sylius 1.0.0 to 1.0.16, 1.1.0 to 1.1.8, 1.2.0 to 1.2.1 versions of AdminBundle and ResourceBundle are affected by this security issue.

This issue has been fixed in Sylius 1.0.17, 1.1.9 and 1.2.2. Development branch for 1.3 release has also been fixed.

Description

The following actions in the admin panel did not require a CSRF token:

  • marking order’s payment as completed
  • marking order’s payment as refunded
  • marking product review as accepted
  • marking product review as rejected

Resolution

The issue is fixed by adding a required CSRF token to those actions.

We also fixed ResourceControllerβ€˜s applyStateMachineTransitionAction method by adding a CSRF token check. If you use that action in the API context, you can disable it by adding csrf_protection: false to its routing configuration

Affected configurations

Vulners
Node
syliuspaypalRange<1.2.2sylius
OR
syliuspaypalRange<1.1.9sylius
OR
syliuspaypalRange<1.0.17sylius

6.9 Medium

AI Score

Confidence

Low