CVE-2021-26296 – org.apache.myfaces.core:myfaces-core-module
Package
Manager: maven
Name: org.apache.myfaces.core:myfaces-core-module
Vulnerable Version: >=0 <2.0.25 || >=2.1.0 <2.1.19 || >=2.2.0 <2.2.14 || >=2.3.0 <2.3.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00321 pctl0.54469
Details
Cryptographically weak CSRF tokens in Apache MyFaces In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. Mitigation: Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation: org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom
Metadata
Created: 2021-06-16T17:31:39Z
Modified: 2021-05-07T21:12:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-gq67-pp9w-43gp/GHSA-gq67-pp9w-43gp.json
CWE IDs: ["CWE-330", "CWE-352"]
Alternative ID: GHSA-gq67-pp9w-43gp
Finding: F007
Auto approve: 1