vendor:
Keystone
by:
Saurabh Banawar
8.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: Keystone
Affected Version From: 4.0.0
Affected Version To: 4.0.0
Patch Exists: YES
Related CWE: 2017-16570
CPE: a:keystonejs:keystone
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 8.1
2017
Application wide CSRF Bypass
A CSRF vulnerability was discovered in KeystoneJS 4.0.0 which allows an attacker to bypass the CSRF protection and create a new user. The vulnerability exists due to the lack of CSRF protection for the /keystone/api/users/create endpoint. An attacker can craft a malicious HTML page and trick a logged-in user into submitting the form, resulting in a new user being created.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to upgrade to the latest version of KeystoneJS.