{"containers":{"cna":{"affected":[{"product":"Apache MyFaces Core","vendor":"Apache Software Foundation","versions":[{"lessThan":"2.2.14","status":"affected","version":"Apache MyFaces Core 2.2","versionType":"custom"},{"lessThan":"2.3.8","status":"affected","version":"Apache MyFaces Core 2.3","versionType":"custom"},{"lessThan":"2.3-next-M5","status":"affected","version":"Apache MyFaces Core 2.3-next","versionType":"custom"},{"lessThan":"3.0.0","status":"affected","version":"Apache MyFaces Core 3.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Apache MyFaces would like to thank Wolfgang Ettlinger (Certitude Consulting GmbH)"}],"descriptions":[{"lang":"en","value":"In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2024-08-03T20:20:55.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["x_refsource_MISC"],"url":"https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E"},{"name":"20210219 [CSA-2021-001] Cross-Site Request Forgery in Apache MyFaces","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://seclists.org/fulldisclosure/2021/Feb/66"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20210528-0007/"}],"source":{"defect":["MYFACES-4373"],"discovery":"UNKNOWN"},"title":"Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces","workarounds":[{"lang":"en","value":"Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation:\n\norg.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom\norg.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom\norg.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom"}],"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2021-26296","STATE":"PUBLIC","TITLE":"Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache MyFaces Core","version":{"version_data":[{"version_affected":"<","version_name":"Apache MyFaces Core 2.2","version_value":"2.2.14"},{"version_affected":"<","version_name":"Apache MyFaces Core 2.3","version_value":"2.3.8"},{"version_affected":"<","version_name":"Apache MyFaces Core 2.3-next","version_value":"2.3-next-M5"},{"version_affected":"<","version_name":"Apache MyFaces Core 3.0","version_value":"3.0.0"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"Apache MyFaces would like to thank Wolfgang Ettlinger (Certitude Consulting GmbH)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E","refsource":"MISC","url":"https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E"},{"name":"20210219 [CSA-2021-001] Cross-Site Request Forgery in Apache MyFaces","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2021/Feb/66"},{"name":"http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html"},{"name":"https://security.netapp.com/advisory/ntap-20210528-0007/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20210528-0007/"}]},"source":{"defect":["MYFACES-4373"],"discovery":"UNKNOWN"},"work_around":[{"lang":"en","value":"Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation:\n\norg.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom\norg.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom\norg.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom"}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:19:20.159Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E"},{"name":"20210219 [CSA-2021-001] Cross-Site Request Forgery in Apache MyFaces","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2021/Feb/66"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20210528-0007/"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2021-26296","datePublished":"2021-02-19T08:30:14.000Z","dateReserved":"2021-01-28T00:00:00.000Z","dateUpdated":"2025-02-13T16:27:52.470Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}