{"containers":{"cna":{"affected":[{"product":"galette","vendor":"galette","versions":[{"status":"affected","version":"< 0.9.6"}]}],"descriptions":[{"lang":"en","value":"Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 do not check for Cross Site Request Forgery attacks. All users are advised to upgrade to 0.9.6 as soon as possible. There are no known workarounds for this issue."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352: Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-12-16T18:10:10.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/galette/galette/security/advisories/GHSA-hw28-c7px-xqm5"},{"tags":["x_refsource_MISC"],"url":"https://github.com/galette/galette/commit/a5602bca2566f1be370631c3ab2d40feedd4b3ad"}],"source":{"advisory":"GHSA-hw28-c7px-xqm5","discovery":"UNKNOWN"},"title":"Missing CSRF checks in Galette","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41260","STATE":"PUBLIC","TITLE":"Missing CSRF checks in Galette"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"galette","version":{"version_data":[{"version_value":"< 0.9.6"}]}}]},"vendor_name":"galette"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 do not check for Cross Site Request Forgery attacks. All users are advised to upgrade to 0.9.6 as soon as possible. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352: Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://github.com/galette/galette/security/advisories/GHSA-hw28-c7px-xqm5","refsource":"CONFIRM","url":"https://github.com/galette/galette/security/advisories/GHSA-hw28-c7px-xqm5"},{"name":"https://github.com/galette/galette/commit/a5602bca2566f1be370631c3ab2d40feedd4b3ad","refsource":"MISC","url":"https://github.com/galette/galette/commit/a5602bca2566f1be370631c3ab2d40feedd4b3ad"}]},"source":{"advisory":"GHSA-hw28-c7px-xqm5","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:08:31.567Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/galette/galette/security/advisories/GHSA-hw28-c7px-xqm5"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/galette/galette/commit/a5602bca2566f1be370631c3ab2d40feedd4b3ad"}]}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2021-41260","datePublished":"2021-12-16T18:10:11.000Z","dateReserved":"2021-09-15T00:00:00.000Z","dateUpdated":"2024-08-04T03:08:31.567Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}