An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/ | exploit third party advisory patch |
https://tuleap.net/plugins/tracker/?aid=11217 | patch vendor advisory |
https://twitter.com/Mustafaran/status/970745812887199744 | third party advisory exploit |
https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189 | patch |
https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=commit&h=d6701289ae55de900929ff0f66313fa9771a198d | issue tracking patch vendor advisory |