Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mbXhxLXY4bWctcWgyNc4AAxxs
apollo-portal has potential CSRF issue
Impact
A low-privileged user can create a special web page. If an authenticated portal admin visits this page, the page can silently send a request to assign new roles for that user without any confirmation from the Portal admin.
Patches
Cookie SameSite strategy was set to Lax in #4664 and was released in v2.1.0.
Workarounds
To fix the potential issue without upgrading, simply follow the advice that does not visit unknown source pages.
References
For more information
If you have any questions or comments about this advisory:
- Open an issue in issue
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mbXhxLXY4bWctcWgyNc4AAxxs
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 5.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
Identifiers: GHSA-fmxq-v8mg-qh25, CVE-2023-25569
References:
- https://github.com/apolloconfig/apollo/security/advisories/GHSA-fmxq-v8mg-qh25
- https://nvd.nist.gov/vuln/detail/CVE-2023-25569
- https://github.com/apolloconfig/apollo/pull/4664
- https://github.com/apolloconfig/apollo/commit/00d968a7229f809b0d8ed0532e8c01a6c2b7c750
- https://github.com/apolloconfig/apollo/releases/tag/v2.1.0
- https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related
- https://github.com/advisories/GHSA-fmxq-v8mg-qh25
Blast Radius: 1.7
Affected Packages
maven:com.ctrip.framework.apollo:apollo
Dependent packages: 0Dependent repositories: 2
Downloads:
Affected Version Ranges: < 2.1.0
Fixed in: 2.1.0
All affected versions: 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.5.1, 1.6.0, 1.6.2, 1.7.0, 1.8.0, 1.9.0, 1.9.1, 1.9.2, 2.0.0, 2.0.1
All unaffected versions: