Lucene search

K
rubygemsRubySecRUBY:PGHERO-2020-16253
HistoryAug 03, 2020 - 9:00 p.m.

CSRF Vulnerability with Non-Session Based Authentication

2020-08-0321:00:00
RubySec
github.com
8

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

The PgHero dashboard is vulnerable to CSRF with non-session based authentication methods.

Impact

The PgHero dashboard is vulnerable to cross-site request forgery (CSRF). This affects the Docker
image, Linux packages, and in specific cases, the Ruby gem. The Ruby gem is vulnerable with
non-session based authentication methods like basic authentication - session-based authentication
methods (like Devise’s default authentication) are not affected.

A CSRF attack works by getting an authorized user to visit a malicious website and then performing
requests on behalf of the user. In this instance, actions include:

  1. Canceling running queries
  2. Running EXPLAIN on queries (without seeing the results, but can be used for denial of service
    and other attacks)
  3. Resetting query stats (running pg_stat_statements_reset())

Affected configurations

Vulners
Node
rubypgheroRange2.7.0
VendorProductVersionCPE
rubypghero*cpe:2.3:a:ruby:pghero:*:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H