Lucene search

K
githubGitHub Advisory DatabaseGHSA-VF7H-6246-HM43
HistoryNov 19, 2021 - 8:18 p.m.

The disqualify lead action may be executed without CSRF token check

2021-11-1920:18:54
CWE-352
GitHub Advisory Database
github.com
13

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

21.7%

Summary

The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack.

Workarounds

There are no workarounds that address this vulnerability.

Affected configurations

Vulners
Node
orocrmRange<4.2.7
OR
orocrmRange3.1.0
OR
orocrmRange<4.1.17
CPENameOperatorVersion
oro/crmlt4.2.7
oro/crmge3.1.0
oro/crmlt4.1.17

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

21.7%

Related for GHSA-VF7H-6246-HM43