Vulnerability Description
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request will succeed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Castel | Nextgen Dvr Firmware | 1.0.0 |
| Castel | Nextgen Dvr | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRFThird Party Advisory
- http://seclists.org/fulldisclosure/2020/Jun/8Mailing ListThird Party Advisory
- https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-requThird Party Advisory
- http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRFThird Party Advisory
- http://seclists.org/fulldisclosure/2020/Jun/8Mailing ListThird Party Advisory
- https://www.securitymetrics.com/blog/where-did-request-come-from-cross-site-requThird Party Advisory
FAQ
What is CVE-2020-11682?
CVE-2020-11682 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this t...
How severe is CVE-2020-11682?
CVE-2020-11682 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11682?
Check the references section above for vendor advisories and patch information. Affected products include: Castel Nextgen Dvr Firmware, Castel Nextgen Dvr.