A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. Using CWE to declare the problem leads to CWE-614. The weakness was presented 12/30/2022 as dadd1711a617000b70e5e408a76531b73187031c. The advisory is available at github.com. This vulnerability is handled as CVE-2018-25060. The attack may be launched remotely. Technical details are available. There is no exploit available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1539 by the MITRE ATT&CK project. It is declared as not defined. As 0-day the estimated underground price was around $0-$5k. The patch is identified as dadd1711a617000b70e5e408a76531b73187031c. The bugfix is ready for download at github.com. It is recommended to apply a patch to fix this issue.
Timeline
The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.
71 Commits
51 more entries are not shown