Vulnerability Details : CVE-2021-45785
Potential exploit
TruDesk Help Desk/Ticketing Solution v1.1.11 is vulnerable to a Cross-Site Request Forgery (CSRF) attack which would allow an attacker to restart the server, causing a DoS attack. The attacker must craft a webpage that would perform a GET request to the /api/v1/admin/restart endpoint, then the victim (who has sufficient privileges), would visit the page and the server restart would begin. The attacker must know the full URL that TruDesk is on in order to craft the webpage.
Vulnerability category: Cross-site request forgery (CSRF)Denial of service
Products affected by CVE-2021-45785
- cpe:2.3:a:trudesk_project:trudesk:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:trudesk_project:trudesk:1.1.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-45785
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-45785
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
2.8
|
1.4
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-03 |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | 2024-06-26 |
CWE ids for CVE-2021-45785
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2021-45785
-
https://1d8.github.io/cves/cve_2021_45785/
CVE-2021-45785 - CSRF on TruDesk |Exploit;Third Party Advisory
Jump to