Bolt CMS before version 3.7.1 lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. This has been fixed in Bolt 3.7.1
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8 | third party advisory patch |
https://github.com/bolt/bolt/pull/7853 | third party advisory patch |
https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f | third party advisory patch |
http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2020/Jul/4 | mailing list exploit third party advisory |