A CSRF issue in WiKID 2FA Enterprise Server through 4.2.0-b2053 allows a remote attacker to trick an authenticated user into performing unintended actions such as (1) create or delete admin users; (2) create or delete groups; or (3) create, delete, enable, or disable normal users or devices.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.securitymetrics.com/blog/ | vendor advisory |
https://www.securitymetrics.com/blog/wikid-2fa-enterprise-server-csrf | patch exploit |
http://seclists.org/fulldisclosure/2019/Oct/35 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html | exploit vdb entry third party advisory |