Cross-Site Request Forgery (CSRF) (CWE-352)
A problematic vulnerability has been identified in SourceCodester School Fees Payment System version 1.0, specifically affecting an unknown part of the file /ajax.php. This vulnerability allows for cross-site request forgery (CSRF) attacks. The attack can be initiated remotely, and a public exploit is available.
This CSRF vulnerability has a high severity, with a CVSS v3.1 base score of 8.8. It can lead to significant impacts on confidentiality, integrity, and availability of the system. Attackers could potentially perform unauthorized actions on behalf of authenticated users, such as manipulating sensitive data, modifying system configurations, or disrupting normal operations of the School Fees Payment System. The attack vector is network-based, requires low attack complexity, and no privileges, but does need user interaction.
One proof-of-concept exploit is available on github.com. Its exploitation has been reported by various sources, including t.me.
Currently, there is no mention of an available patch for this vulnerability in SourceCodester School Fees Payment System version 1.0.
To mitigate this vulnerability: 1. Implement anti-CSRF tokens in all forms and AJAX requests within the School Fees Payment System. 2. Use the SameSite cookie attribute to limit the scope of cookies. 3. Implement strict input validation and sanitization for all user inputs, particularly in the /ajax.php file. 4. Add security headers such as Content-Security-Policy. 5. Regularly update and patch the School Fees Payment System software. 6. Educate users about the risks of clicking on untrusted links while authenticated to the system.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-7169. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-7169
A CVSS base score of 4.3 has been assigned.
Feedly estimated the CVSS score as HIGH
Attacks in the wild have been reported by CTI Feeds - Cybercrime on Telegram. See article
EPSS Score was set to: 0.05% (Percentile: 16.1%)
A CVSS base score of 8.8 has been assigned.