Miggo Logo

CVE-2022-28731: Apache JSPWiki CSRF due to crafted request on UserPreferences.jsp

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.95073%
Published
8/5/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.jspwiki:jspwiki-mainmaven< 2.11.32.11.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from UserPreferences.jsp processing user preference updates without CSRF protection. Since the CVE explicitly mentions UserPreferences.jsp as the attack vector and describes email modification via crafted requests, the form submission handler in this JSP file is the logical point of vulnerability. CSRF typically occurs when state-changing requests lack anti-CSRF tokens, which aligns with the described attack pattern. The high confidence comes from the direct reference to UserPreferences.jsp in all vulnerability descriptions and the clear CSRF mechanism (CWE-352) involved.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* **r**ully *r**t** r*qu*st on Us*rPr***r*n**s.jsp *oul* tri***r *n *SR* vuln*r**ility on *p**** JSPWiki ***or* *.**.*, w*i** *oul* *llow t** *tt**k*r to mo*i*y t** *m*il *sso*i*t** wit* t** *tt**k** ***ount, *n* t**n * r*s*t p*sswor* r*qu*st *rom t*

Reasoning

T** vuln*r**ility st*ms *rom `Us*rPr***r*n**s.jsp` pro**ssin* us*r pr***r*n** up**t*s wit*out *SR* prot**tion. Sin** t** *V* *xpli*itly m*ntions `Us*rPr***r*n**s.jsp` *s t** *tt**k v**tor *n* **s*ri**s *m*il mo*i*i**tion vi* *r**t** r*qu*sts, t** *or