Vulnerability Name: CVE-2021-26296 (CCN-197017) Assigned: 2021-02-18 Published: 2021-02-18 Updated: 2021-06-02 Summary: In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H )7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-352 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2021-26296 Source: MISC Type: Exploit, Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html Source: FULLDISC Type: Mailing List, Third Party Advisory20210219 [CSA-2021-001] Cross-Site Request Forgery in Apache MyFaces Source: XF Type: UNKNOWNapache-cve202126296-csrf(197017) Source: CCN Type: myfaces GIT RepositoryMYFACES-4373: make sure SecureRandom is used for invalid configs #134 Source: MISC Type: Mailing List, Vendor Advisoryhttps://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E Source: CCN Type: Packet Storm Security [02-20-2021]Apache MyFaces 2.x Cross Site Request Forgery Source: CCN Type: oss-sec Mailing List, Thu, 18 Feb 2021 12:53:39 -0500CVE-2021-26296: Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20210528-0007/ Source: CCN Type: IBM Security Bulletin 6441433 (WebSphere Application Server)Vulnerability in Apache MyFaces affects WebSphere Application Server (CVE-2021-26296) Source: CCN Type: IBM Security Bulletin 6446257 (Liberty for Java)Vulnerability in Apache MyFaces affects Liberty for Java for IBM Cloud (CVE-2021-26296) Source: CCN Type: IBM Security Bulletin 6452161 (Cloud Orchestrator)Vulnerabilities in WebSphere Application Server affect IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise Source: CCN Type: IBM Security Bulletin 6454803 (Spectrum Control)Vulnerabilities in XStream, Java, OpenSSL, WebSphere Application Server Liberty and Node.js affect IBM Spectrum Control Source: CCN Type: IBM Security Bulletin 6455913 (Tivoli Application Dependency Discovery Manager)Information disclosure vulnerability in WebSphere Application Server Liberty Source: CCN Type: IBM Security Bulletin 6457783 (Content Collector for Email)Embedded WebSphere Application Server is vulnerable to Apache MyFaces, which affects Content Collector for Email Source: CCN Type: IBM Security Bulletin 6465127 (Cloud Pak for Automation)Multiple vulnerabilities affect IBM Cloud Pak for Automation Source: CCN Type: IBM Security Bulletin 6466323 (Cloud Transformation Advisor)IBM Cloud Transformation Advisor is affected by a vulnerability in WebSphere Application Server Liberty (CVE-2021-26296) Source: CCN Type: IBM Security Bulletin 6467155 (Rational Asset Analyzer)Rational Asset Analyzer (RAA) is affected by a WebSphere Application Server vulnerability (CVE-2021-26296) Source: CCN Type: IBM Security Bulletin 6469907 (NovaLink)Novalink is impacted by Apache MyFaces affects WebSphere Liberty, middle vulnerability in WebSphere Application Server Liberty (CVE-2021-26296) Source: CCN Type: IBM Security Bulletin 6470235 (CICS TX on Cloud)A vulnerability in WebSphere Application Server Liberty affects IBM CICS TX on Cloud Source: CCN Type: IBM Security Bulletin 6471655 (Tivoli Monitoring)Multiple vulnerabilities affect IBM Tivoli Monitoring installed WebSphere Application Server Source: CCN Type: IBM Security Bulletin 6471953 (Common Licensing)Multiple Vulnerabilities in IBM WebSphere Application Server Liberty affect IBM LKS Administration and Reporting Tool and its Agent Source: CCN Type: IBM Security Bulletin 6485501 (TXSeries for Multiplatforms)A vulnerability in WebSphere Application Server Liberty affects TXSeries for Multiplatforms Source: CCN Type: IBM Security Bulletin 6486349 (Cloud Private)IBM Cloud Private is vulnerable to Apache vulnerabilities (CVE-2021-26296) Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2021-26296 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:myfaces:*:*:*:*:*:*:*:* (Version >= 2.2.0 and <= 2.2.13)OR cpe:/a:apache:myfaces:2.3:next-m1:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3:next-m2:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3:next-m3:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3:next-m4:*:*:*:*:*:* OR cpe:/a:apache:myfaces:*:*:*:*:*:*:*:* (Version >= 2.3.0 and <= 2.3.7) OR cpe:/a:apache:myfaces:3.0.0:rc1:*:*:*:*:*:* Configuration 2 :cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:myfaces:2.2.0:*:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.2.13:*:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3.0:-:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3.7:*:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3:next-m1:*:*:*:*:*:* OR cpe:/a:apache:myfaces:2.3:next-m4:*:*:*:*:*:* OR cpe:/a:apache:myfaces:3.0.0:rc1:*:*:*:*:*:* AND cpe:/a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_asset_analyzer:6.1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_monitoring:6.3.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_orchestrator:2.5.0.10:*:*:*:-:*:*:* OR cpe:/a:ibm:content_collector:4.0.1:*:*:*:email:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.1.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:8.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:9.1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:* OR cpe:/a:ibm:rational_asset_analyzer:6.1.0.23:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.4:*:standard:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.5:*:standard:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.3.7:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_control:5.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:17.0.0.3:*:*:*:liberty:*:*:* OR cpe:/a:ibm:websphere_application_server:21.0.0.3:*:*:*:liberty:*:*:* OR cpe:/a:ibm:cloud_pak_for_automation:21.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:txseries:9.1.0.2:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
apache myfaces *
apache myfaces 2.3 next-m1
apache myfaces 2.3 next-m2
apache myfaces 2.3 next-m3
apache myfaces 2.3 next-m4
apache myfaces *
apache myfaces 3.0.0 rc1
netapp oncommand insight -
apache myfaces 2.2.0
apache myfaces 2.2.13
apache myfaces 2.3.0 -
apache myfaces 2.3.7
apache myfaces 2.3 next-m1
apache myfaces 2.3 next-m4
apache myfaces 3.0.0 rc1
ibm websphere application server 8.0
ibm websphere application server 8.5
ibm websphere application server 9.0
ibm rational asset analyzer 6.1.0.0
ibm tivoli monitoring 6.3.0.2
ibm tivoli monitoring 6.3.0.3
ibm tivoli monitoring 6.3.0.4
ibm tivoli monitoring 6.3.0.5
ibm tivoli monitoring 6.3.0.6
ibm tivoli monitoring 6.3.0.7
ibm spectrum control 5.3.1
ibm spectrum control 5.3.2
ibm spectrum control 5.3.3
ibm spectrum control 5.3.0.1
ibm cloud orchestrator 2.5.0.10
ibm content collector 4.0.1
ibm tivoli application dependency discovery manager 7.3.0.0
ibm txseries 8.1.0.0
ibm txseries 8.1.0.3
ibm txseries 8.2.0.0
ibm txseries 8.2.0.2
ibm txseries 9.1.0.0
ibm cloud private 3.2.1 cd
ibm rational asset analyzer 6.1.0.23
ibm cloud private 3.2.2 cd
ibm spectrum control 5.3.4
ibm spectrum control 5.3.5
ibm spectrum control 5.3.6
ibm spectrum control 5.3.7
ibm spectrum control 5.4.1
ibm websphere application server 17.0.0.3
ibm websphere application server 21.0.0.3
ibm cloud pak for automation 21.0.1
ibm txseries 9.1.0.2