OWASP PHP CSRF Guard 3.0.0 CSRF Token csrfguard_validate_token $token_value privileges management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.1 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in OWASP PHP CSRF Guard 3.0.0. Affected by this vulnerability is the function csrfguard_validate_token of the component CSRF Token Handler. Performing a manipulation of the argument $token_value results in privileges management.
Furthermore, an exploit is available.
It is suggested to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in OWASP PHP CSRF Guard 3.0.0 (Programming Language Software). This affects the function csrfguard_validate_token of the component CSRF Token Handler. The manipulation of the argument $token_value with an unknown input leads to a privileges management vulnerability. CWE is classifying the issue as CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was published 12/07/2012 by Krzysztof Kotowicz as On handling your pets (Website). It is possible to read the advisory at blog.kotowicz.net. The public release has been coordinated with OWASP. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
A public exploit has been developed by Krzysztof Kotowicz in PHP and been published immediately after the advisory. The exploit is shared for download at blog.kotowicz.net. It is declared as proof-of-concept.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at OSVDB (88281†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.6
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Krzysztof Kotowicz
Programming Language: 🔍
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
12/07/2012 🔍12/07/2012 🔍
12/07/2012 🔍
12/10/2012 🔍
05/02/2018 🔍
Sources
Advisory: On handling your petsResearcher: Krzysztof Kotowicz
Status: Not defined
Coordinated: 🔍
GCVE (VulDB): GCVE-100-7095
OSVDB: 88281
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 12/10/2012 17:15Updated: 05/02/2018 09:11
Changes: 12/10/2012 17:15 (52), 05/02/2018 09:11 (2)
Complete: 🔍
Committer:
Cache ID: 216:FE3:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.