Lucene search

K
githubGitHub Advisory DatabaseGHSA-GJVC-55FW-V6VQ
HistoryAug 21, 2023 - 8:28 p.m.

Wallabag user can delete own API client unintentionally

2023-08-2120:28:03
CWE-352
GitHub Advisory Database
github.com
19
wallabag
csrf
vulnerability
api key
patch
security
huntr.dev

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

26.5%

Description

wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete API key via /developer/client/delete/{id}

This vulnerability has a CVSSv3.1 score of 6.5.

You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration.

Resolution

This action is now doable only via POST method, which ensures that we can’t do it via a 3rd-party website.

Credits

We would like to thank @tht1997 for reporting this issue through huntr.dev.

Reference: https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/

Affected configurations

Vulners
Node
wallabagwallabagRange2.0.0-alpha.12.6.2
VendorProductVersionCPE
wallabagwallabag*cpe:2.3:a:wallabag:wallabag:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

26.5%

Related for GHSA-GJVC-55FW-V6VQ