Vulnerability Description
KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Keystonejs | Keystone | < 4.0.0 |
Related Weaknesses (CWE)
References
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/Issue TrackingThird Party Advisory
- https://github.com/keystonejs/keystone/issues/4437Issue TrackingThird Party Advisory
- https://github.com/keystonejs/keystone/pull/4478Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43922/
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/Issue TrackingThird Party Advisory
- https://github.com/keystonejs/keystone/issues/4437Issue TrackingThird Party Advisory
- https://github.com/keystonejs/keystone/pull/4478Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/43922/
FAQ
What is CVE-2017-16570?
CVE-2017-16570 is a vulnerability with a CVSS score of 8.8 (HIGH). KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests tha...
How severe is CVE-2017-16570?
CVE-2017-16570 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16570?
Check the references section above for vendor advisories and patch information. Affected products include: Keystonejs Keystone.