CVE-2017-16570
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
06/11/2017
Last modified:
20/04/2025
Description
KeystoneJS before 4.0.0-beta.7 allows application-wide CSRF bypass by removing the CSRF parameter and value, aka SecureLayer7 issue number SL7_KEYJS_03. In other words, it fails to reject requests that lack an x-csrf-token header.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:keystonejs:keystone:*:beta7:*:*:*:*:*:* | 4.0.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/
- https://github.com/keystonejs/keystone/issues/4437
- https://github.com/keystonejs/keystone/pull/4478
- https://www.exploit-db.com/exploits/43922/
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/
- https://github.com/keystonejs/keystone/issues/4437
- https://github.com/keystonejs/keystone/pull/4478
- https://www.exploit-db.com/exploits/43922/



