Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces
CVE-2021-26296

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
19 February 2021

Summary

In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

Affected Version(s)

Apache MyFaces Core Apache MyFaces Core 2.2 < 2.2.14

Apache MyFaces Core Apache MyFaces Core 2.3 < 2.3.8

Apache MyFaces Core Apache MyFaces Core 2.3-next < 2.3-next-M5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Apache MyFaces would like to thank Wolfgang Ettlinger (Certitude Consulting GmbH)
.