Vulnerability Details : CVE-2021-21395
Potential exploit
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2021-21395
- cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
- cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-21395
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-21395
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST | |
4.2
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N |
1.6
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2021-21395
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-21395
-
https://hackerone.com/reports/1086752
HackerOneExploit;Third Party Advisory
-
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4
Reset Password not protected against well-timed CSRF · Advisory · OpenMage/magento-lts · GitHubThird Party Advisory
-
https://packagist.org/packages/openmage/magento-lts
openmage/magento-lts - PackagistThird Party Advisory
Jump to