A vulnerability, which was classified as problematic, was found in Webkul QloApps 1.6.1. Affected is the function logout of the file /en/?mylogout of the component URL Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure. They are aware about it and are working on resolving it.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.294834 | technical description third party advisory vdb entry |
https://vuldb.com/?ctiid.294834 | permissions required vdb entry signature |
https://vuldb.com/?submit.491600 | third party advisory vdb entry |
https://github.com/mano257200/qloapps-csrf-logout-vulnerability | exploit third party advisory |