7.5

CVE-2021-26296

Exploit

In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheMyfaces Version >= 2.2.0 <= 2.2.13
ApacheMyfaces Version >= 2.3.0 <= 2.3.7
ApacheMyfaces Version2.3 Updatenext-m1
ApacheMyfaces Version2.3 Updatenext-m2
ApacheMyfaces Version2.3 Updatenext-m3
ApacheMyfaces Version2.3 Updatenext-m4
ApacheMyfaces Version3.0.0 Updaterc1
NetappOncommand Insight Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.32% 0.545
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.