Lucene search

K
githubGitHub Advisory DatabaseGHSA-P8GP-899C-JVQ9
HistoryAug 21, 2023 - 8:28 p.m.

Wallabag user can reset data unintentionally

2023-08-2120:28:06
CWE-352
GitHub Advisory Database
github.com
13
wallabag
csrf
vulnerability
reset
annotations
entries
tags
cvssv3.1
patch
instance
post method
huntr.dev

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

20.6%

Description

wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily reset annotations, entries and tags, by the GET request to /reset/annotations, /reset/entries, /reset/tags, /reset/archived.

This vulnerability has a CVSSv3.1 score of 4.3.

You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration.

Resolution

These actions are now doable only via POST method, which ensures that we can’t do them via a 3rd-party website.

Credits

We would like to thank @zpbrent for reporting this issue through huntr.dev.

Reference: https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/

Affected configurations

Vulners
Node
wallabagwallabagRange2.0.0-alpha.12.6.2
VendorProductVersionCPE
wallabagwallabag*cpe:2.3:a:wallabag:wallabag:*:*:*:*:*:*:*:*

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

20.6%

Related for GHSA-P8GP-899C-JVQ9