An issue was discovered in PONTON X/P Messenger before 3.11.2. Anti-CSRF tokens are globally valid, making the web application vulnerable to a weakened version of CSRF, where an arbitrary token of a low-privileged user (such as operator) can be used to confirm actions of higher-privileged ones (such as xpadmin).
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.ponton.de/products/xpmessenger/ | product vendor advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-080.txt | release notes exploit third party advisory |