Prior to microweber/microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery, fetch contents from same-site and redirect a user.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://huntr.dev/bounties/7782c095-9e8c-48b0-a7f5-3a8f52e8af52 | exploit third party advisory patch |
https://github.com/microweber/microweber/commit/79c6914bab8c9da07ac950fda17648d08c68b130 | third party advisory patch |