Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces
CVE-2021-26296
7.5HIGH
Summary
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.
Affected Version(s)
Apache MyFaces Core Apache MyFaces Core 2.2 < 2.2.14
Apache MyFaces Core Apache MyFaces Core 2.3 < 2.3.8
Apache MyFaces Core Apache MyFaces Core 2.3-next < 2.3-next-M5
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Apache MyFaces would like to thank Wolfgang Ettlinger (Certitude Consulting GmbH)