Advertisement






perfSONAR - v4.x < = v4.4.5 - Partial Blind CSRF

CVE Category Price Severity
CVE-2022-41413 $Unknown Unknown
Author Risk Exploitation Type Date
Unknown Unknown Unknown 2022-12-01
CPE
cpe:cpe:/a:perfsonar:perfsonar:4.5
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022120002

Below is a copy:

perfSONAR - v4.x <= v4.4.5 - Partial Blind CSRF
https://github.com/renmizo/CVE-2022-41413/

Vendor: perfSONAR
Link: https://github.com/perfsonar/
Affected Versions: v4.x <= v4.4.5
Vulnerability Type: Partial Blind CSRF
Discovered by: Ryan Moore
CVE: CVE-2022-41413
Summary

A partial blind CSRF vulnerability exists in perfSONAR v4.x <= v4.4.5 within the /perfsonar-graphs/ test results page. Parameters and values can be injected/passed via the URL parameter, forcing the client to connect unknowingly in the background to other sites via transparent XMLHTTPRequests. This partial blind CSRF bypasses the built-in whitelisting function in perfSONAR.

This vulnerability was patched in perfSONAR v4.4.6.

Proof of Concept

Examples

Here are two examples of this vulnerability. For further details, review the Technical Overview section below.

Example 1:

Client browser connects to www.google.com in the background.

http://192.168.68.145/perfsonar-graphs/?source=1&dest=2&url=https://www.google.com

Example 2:

Client browser connects to arbitrary IP and port in the background, passing delete parameter to /api endpoint.

http://192.168.68.145/perfsonar-graphs/?source=8.8.8.8&dest=%26action%3Ddelete&url=http://192.168.68.113:4444/api

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum