First published: Fri May 22 2020(Updated: )
An issue was discovered in Aviatrix Controller before 5.4.1204. An API call on the web interface lacked a session token check to control access, leading to CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aviatrix Controllers | <5.4.1204 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13412 is a vulnerability discovered in Aviatrix Controller before version 5.4.1204 that allows for CSRF attacks due to a lack of session token check.
The severity of CVE-2020-13412 is high, with a CVSS score of 8.8.
CVE-2020-13412 affects Aviatrix Controller versions up to and excluding 5.4.1204, allowing for CSRF attacks through an API call on the web interface.
To fix CVE-2020-13412, it is recommended to upgrade to Aviatrix Controller version 5.4.1204 or later, which includes a session token check to prevent CSRF attacks.
Yes, you can find more information about CVE-2020-13412 in the Aviatrix Controller security bulletin article at the following link: [https://docs.aviatrix.com/HowTos/security_bulletin_article.html#cross-site-request-forgery-csrf]