Impact
Affected URLs:
/
/pages/UI.php
/pages/ajax.render.php
/pages/ajax.searchform.php
/pages/exec.php
/pages/exec.php/object/apply-stimulus/ev_wait_for_approval/UserRequest/5917
/pages/exec.php/object/apply-stimulus/ev_wait_for_approval/UserRequest/6399
/pages/exec.php/object/attachment/add
/pages/exec.php/object/create/Incident
/pages/exec.php/object/create/UserRequest
/pages/exec.php/object/edit/Incident/5648
/pages/exec.php/object/edit/Person/324
/pages/exec.php/object/edit/UserRequest/5917
/pages/exec.php/object/get-information/json
/pages/exec.php/object/search/from-attribute/contacts_list/Incident
/pages/exec.php/object/search/from-attribute/contacts_list/UserRequest
/pages/exec.php/object/search/from-attribute/related_request_list/UserRequest
/pages/exec.php/object/view/Organization/4
/pages/exec.php/object/view/Person/300
/pages/exec.php/object/view/Person/324
/pages/exec.php/session-message/add
/pages/exec.php/user
/pages/run_query.php
Patches
Method recommended by OWASP: Custom request header
References
N°7124 - [SECU] Cross-Site Request Forgery (CSRF) in several iTop pages
Impact
Affected URLs:
/
/pages/UI.php
/pages/ajax.render.php
/pages/ajax.searchform.php
/pages/exec.php
/pages/exec.php/object/apply-stimulus/ev_wait_for_approval/UserRequest/5917
/pages/exec.php/object/apply-stimulus/ev_wait_for_approval/UserRequest/6399
/pages/exec.php/object/attachment/add
/pages/exec.php/object/create/Incident
/pages/exec.php/object/create/UserRequest
/pages/exec.php/object/edit/Incident/5648
/pages/exec.php/object/edit/Person/324
/pages/exec.php/object/edit/UserRequest/5917
/pages/exec.php/object/get-information/json
/pages/exec.php/object/search/from-attribute/contacts_list/Incident
/pages/exec.php/object/search/from-attribute/contacts_list/UserRequest
/pages/exec.php/object/search/from-attribute/related_request_list/UserRequest
/pages/exec.php/object/view/Organization/4
/pages/exec.php/object/view/Person/300
/pages/exec.php/object/view/Person/324
/pages/exec.php/session-message/add
/pages/exec.php/user
/pages/run_query.php
Patches
Method recommended by OWASP: Custom request header
References
N°7124 - [SECU] Cross-Site Request Forgery (CSRF) in several iTop pages