脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Apollo Embedded Sandbox and Explorer vulnerable to CSRF via window.postMessage origin-validation bypass
脆弱性説明
Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
脆弱性タイプ
源验证错误
脆弱性タイトル
Apollo Studio Embeddable Explorer & Embeddable Sandbox 跨站请求伪造漏洞
脆弱性説明
Apollo Studio Embeddable Explorer & Embeddable Sandbox是Apollo GraphQL开源的一个向量化工具。 Apollo Studio Embeddable Explorer & Embeddable Sandbox存在跨站请求伪造漏洞,该漏洞源于客户端代码处理window.postMessage事件时缺少来源验证,可能导致跨站请求伪造攻击。
CVSS情報
N/A
脆弱性タイプ
N/A