Ivano Binetti has discovered a vulnerability in Contao, which can be exploited by malicious people to conduct cross-site request forgery attacks
You need to log in to the Secunia Community to view the full description of this advisory
If you are not a member of the Secunia community, you can sign up here for free.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Score: 0 Posts: 1 User Since: 21st Feb 2013 System Score: N/A Location: NL Last edited on 21st Feb, 2013 09:07
This issue was fixed and the versions mentioned above were never even vulnerable! Very unprecise issue!
This vulnerability was mentioned on the Contao forum by the lead developer: "The reported issue never really was an issue. To exploit the "vulnerability", the malicious website would have to know the domain name of your Contao installation, which is very unlikely!
Second of all, the request token system prevents this kind of attack, so the report can be considered fixed (and outdated)."