Cross-site Request Forgery (CSRF) Affecting yetiforce/yetiforce-crm package, versions >=0.0.0, <6.4.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-YETIFORCEYETIFORCECRM-2359253
  • published24 Jan 2022
  • disclosed24 Jan 2022
  • creditsupernaruto16

Introduced: 24 Jan 2022

CVE-2022-0269  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade yetiforce/yetiforce-crm to version 6.4.0 or higher.

Overview

yetiforce/yetiforce-crm is an an open and innovative CRM system. Our team created for you one of the most innovative CRM systems that supports mainly business processes and allows for customization according to your needs. Be ahead of your competition and implement YetiForce!

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF protection, which allows an attacker to create a new admin. Even when SameSite: Strict is enabled, this still can be exploited by an attacker with the lowest privilege account.

References

CVSS Scores

version 3.1