CGI Generic Cross-Site Request Forgery Detection (potential)

medium Nessus Plugin ID 56818

Synopsis

The remote web server might be prone to cross-site request forgery attacks.

Description

Nessus has found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common anti-cross-site request forgery (XSRF) protection. The web application might be vulnerable to XSRF attacks. Note that :

- Nessus did not exploit the flaw.
- Nessus cannot identify sensitive actions; for example, on an online bank, consulting an account is less sensitive than transferring money.

You will need to audit the source of the CGI scripts and check if they are actually affected.

Solution

Restrict access to the application vulnerable to cross-site request forgery. Contact the vendor for a patch or upgrade.

See Also

https://en.wikipedia.org/wiki/Cross-site_request_forgery

Plugin Details

Severity: Medium

ID: 56818

File Name: pci_dss_potential_xsrf.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 11/17/2011

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Vulnerability Information

Required KB Items: Settings/PCI_DSS

Reference Information

CWE: 352, 716, 751, 801, 814, 928, 936