vendor:
SynTail
by:
Marlow Tannhauser
7.5
CVSS
HIGH
CSRF/Stored XSS
352
CWE
Product Name: SynTail
Affected Version From: 1.5 Build 566
Affected Version To: 1.5 Build 566
Patch Exists: YES
Related CWE: 2015-3140
CPE: a:synametrics:syntail:1.5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Web apps
2015
Multiple vulnerabilities in SynTail 1.5 Build 566 (CSRF/Stored XSS)
SynTail 1.5 Build 566 is vulnerable to CSRF attacks, which can also be combined with stored XSS attacks (authenticated administrators only). The JSESSIONID created when a user logs on to the system is persistent and does not change across requests. The following PoC uses the CSRF vulnerability to create a new file bundle, and combines it with one of the stored XSS vulnerabilities. The following PoC uses the CSRF vulnerability to delete a file bundle, and combines it with one of the stored XSS vulnerabilities.
Mitigation:
The vulnerable version of the product is no longer available for download from the vendor's webpage.