REDCap through 15.0.0 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent.
History

Tue, 24 Dec 2024 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 22 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Description REDCap through 15.0.0 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-12-22T00:00:00

Updated: 2024-12-24T02:25:46.177Z

Reserved: 2024-12-18T00:00:00

Link: CVE-2024-56310

cve-icon Vulnrichment

Updated: 2024-12-24T02:25:39.389Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-22T21:15:16.433

Modified: 2024-12-24T03:15:07.440

Link: CVE-2024-56310

cve-icon Redhat

No data.