CVE-2021-26296

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-26296
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26296.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-26296
Aliases
Published
2021-02-19T09:15:13Z
Modified
2024-09-03T03:45:41.478420Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

References

Affected packages

Git / github.com/apache/myfaces

Affected versions

myfaces-core-module-2.*

myfaces-core-module-2.2.0
myfaces-core-module-2.2.1
myfaces-core-module-2.2.10
myfaces-core-module-2.2.11
myfaces-core-module-2.2.12
myfaces-core-module-2.2.13
myfaces-core-module-2.2.2
myfaces-core-module-2.2.3
myfaces-core-module-2.2.4
myfaces-core-module-2.2.5
myfaces-core-module-2.2.6
myfaces-core-module-2.2.7
myfaces-core-module-2.2.8
myfaces-core-module-2.2.9
myfaces-core-module-2.3.0-beta
myfaces-core-module-2.3.1