The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 11 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users. | |
Title | Cross-Site Request-Forgery | |
Weaknesses | CWE-352 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-12-11T15:54:38.151Z
Updated: 2024-12-11T17:03:00.983Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28141

Updated: 2024-12-11T17:02:48.805Z

Status : Received
Published: 2024-12-11T16:15:10.160
Modified: 2024-12-11T17:15:15.007
Link: CVE-2024-28141

No data.