Advertisement






Papoo CMS Cross Site Request Forgery

CVE Category Price Severity
CVE-2022-3185 CWE-352 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2021-04-05
CPE
cpe:cpe:/a:papoo:papoo_cms
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 0.0659 0.48061

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021040033

Below is a copy:

Papoo CMS Cross Site Request Forgery
Advisory: CSRF Vulnerability in Papoo CMS
Advisory ID: rADV-2021-01
Author: Reinhard Westerholt
Affected Software: 21.02 Rev. 04f1ca6 - Papoo Light
                   6.0.1 Rev. 4770    - Papoo Pro
Vendor URL: http://www.papoo.de/
Vendor Status: fixed
CVE-ID: -

==========================
Vulnerability Description:
==========================

The Papoo CMS is vulnerable against CSRF attacks due to missing CSRF protection.

==================
Technical Details:
==================

Formulars of the administration interfaces are not protected against CSRF attacks, therefore an attacker could change the admin password through a cross-site remote request.


=========
Solution:
=========

Update to the latest version

====================
Disclosure Timeline:
====================
08-Mar-2021  found CSRF weakness
09-Mar-2021 - informed the developers 
19-Mar-2021 - fix published by vendor
03-Apr-2021 - published this security advisory


========
Credits:
========

Vulnerability found and advisory written by Reinhard Westerholt.

===========
References:
===========

http://www.papoo.de/
https://github.com/raginx/security

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum