vendor:
Metasploit
by:
Dhiraj Mishra
7,5
CVSS
HIGH
Cross Site Request Forgery (CSRF)
352
CWE
Product Name: Metasploit
Affected Version From: Metasploit Pro, Express, Ultimate, and Community
Affected Version To: Metasploit Pro, Express, Ultimate, and Community
Patch Exists: YES
Related CWE: CVE-2017-15084 (R7-2017-22)
CPE: a:rapid7:metasploit
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2017
CSRF
Metasploit Pro, Express, Ultimate, and Community can encounter an issue of cross site request forgery (also known as one-click attack and is abbreviated as CSRF or XSRF), which is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. A CSRF attack attempts to exploit the trust that a specific website has in a user's browser. The MSF did not protect the logout form with csrf token, therefore i can logout any user by sending this url https://Metasploit-Server-IP:3790/logout. It's less damaging than a traditional 'hack back' but is sure to irritate the local red team to no end. It's essentially a user DoS.
Mitigation:
Rapid7 has released a security bulletin to address this issue. The bulletin can be found at https://blog.rapid7.com/2017/10/06/vulnerabilities-affecting-four-rapid7-products-fixed/