First published: Mon Nov 20 2023(Updated: )
OpenSIS Classic Community Edition version 9.0 lacks cross-site request forgery (CSRF) protection throughout the whole app. This may allow an attacker to trick an authenticated user into performing any kind of state changing request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38885 is a vulnerability in OpenSIS Classic Community Edition version 9.0 that lacks cross-site request forgery (CSRF) protection.
The severity of CVE-2023-38885 is high, with a severity value of 8.8.
CVE-2023-38885 allows an attacker to trick an authenticated user into performing any kind of state changing request.
To fix CVE-2023-38885, it is recommended to implement proper cross-site request forgery (CSRF) protection throughout the whole app.
For more information about CVE-2023-38885, you can refer to the following references: 1. GitHub repository: https://github.com/OS4ED/openSIS-Classic 2. OS4Ed website: https://www.os4ed.com/ 3. Vulnerability research repository: https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38885