Description
Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0339 | Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others. |
Github GHSA |
GHSA-rhvc-x32h-5526 | No CSRF Validation in droppy |
References
| Link | Providers |
|---|---|
| https://nodesecurity.io/advisories/91 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T18:33:59.616Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2016-10529
No data.
Status : Modified
Published: 2018-05-31T20:29:00.940
Modified: 2024-11-21T02:44:12.530
Link: CVE-2016-10529
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA