Miggo Logo

CVE-2019-13611: python-engineio vulnerable to Cross-Site Request Forgery (CSRF)

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.35049%
Published
7/30/2019
Updated
10/25/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
python-engineiopip<= 3.8.23.9.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing Origin header validation during WebSocket handshakes. The Server.handle_request function manages connection setup, and WebSocketTransport implementations (like aiohttp's _handle_websocket) process handshakes. Pre-3.9.0 versions lacked Origin checks in these functions, allowing attackers to establish unauthorized WebSocket connections using stolen cookies. The patch explicitly added Origin validation to these critical points in the connection lifecycle.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## W**So*k*t *ross-ori*in vuln*r**ility ### Imp**t T*is is * *ross-Sit* R*qu*st *or**ry (*SR*) vuln*r**ility. It *****ts So*k*t.IO *n* *n*in*.IO w** s*rv*rs t**t *ut**nti**t* *li*nts usin* *ooki*s. ### P*t***s pyt*on-*n*in*io v*rsion *.*.* p*t***s

Reasoning

T** vuln*r**ility st*ms *rom missin* Ori*in *****r v*li**tion *urin* W**So*k*t **n*s**k*s. T** S*rv*r.**n*l*_r*qu*st *un*tion m*n***s *onn**tion s*tup, *n* W**So*k*tTr*nsport impl*m*nt*tions (lik* *io*ttp's _**n*l*_w**so*k*t) pro**ss **n*s**k*s. Pr*-