Cross-site Request Forgery (CSRF) Affecting org.apache.jspwiki:jspwiki-war package, versions [,2.11.3)
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHEJSPWIKI-2971024
-
published
4 Aug 2022
-
disclosed
4 Aug 2022
-
credit
Huiseong Seo
Introduced: 4 Aug 2022
New CVE-2022-34158 Open this link in a new tabHow to fix?
Upgrade org.apache.jspwiki:jspwiki-war
to version 2.11.3 or higher.
Overview
org.apache.jspwiki:jspwiki-war is an open source WikiWiki engine, feature-rich and built around standard JEE components (Java, servlets, JSP).
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in CsrfProtectionFilter.java
due to not adequately filtering requests against DeleteGroup.jsp
, EditGroup.jsp
, and NewGroup.jsp
. This allows an attacker to modify an account email address and reset its password, or escalate to group privileges from a user account.