The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover | third party advisory exploit |
https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed | third party advisory exploit |