Cross-Site Request Forgery (CSRF) (CWE-352)
A vulnerability classified as problematic was found in SeaCMS 13.0. The issue affects an unknown functionality of the file /member.php?action=chgpwdsubmit of the component Password Change Handler. The manipulation of the argument newpwd/newpwd2 leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
This vulnerability allows an attacker to perform cross-site request forgery (CSRF) attacks. CSRF attacks can force end users to execute unwanted actions on a web application in which they're currently authenticated. This could lead to unauthorized actions being performed on behalf of the victim, such as changing passwords, making unauthorized transactions, or modifying user data. The impact is somewhat mitigated by the fact that user interaction is required for the attack to succeed, and the integrity impact is classified as low. There is no direct impact on confidentiality or availability of the system.
There is no evidence that a public proof-of-concept exists. Its exploitation has been reported by various sources, including t.me.
The vulnerability information does not explicitly mention whether a patch is available. However, given that the vulnerability is in SeaCMS version 13.0, it's recommended to check for any newer versions or security updates from the SeaCMS developers that might address this issue.
1. Update SeaCMS to the latest version if a patch is available. 2. Implement CSRF tokens in all forms and state-changing requests to prevent CSRF attacks. 3. Use the SameSite cookie attribute to limit the scope of your cookies. 4. Implement proper Content Security Policy (CSP) headers. 5. Educate users about the risks of clicking on untrusted links, especially when they are logged into the SeaCMS system. 6. Consider implementing additional authentication steps for sensitive actions, such as changing passwords. 7. Regularly review and test the security of the password change functionality.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-7161. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-7161
A CVSS base score of 4.3 has been assigned.
Attacks in the wild have been reported by CTI Feeds - Cybercrime on Telegram. See article
EPSS Score was set to: 0.05% (Percentile: 16.1%)
A CVSS base score of 6.5 has been assigned.
A CVSS base score of 6.5 has been assigned.