KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ | issue tracking third party advisory |
https://github.com/keystonejs/keystone/issues/4437 | issue tracking third party advisory |
https://github.com/keystonejs/keystone/pull/4478 | issue tracking third party advisory |
https://www.exploit-db.com/exploits/43922/ | exploit |