CVE-2023-45670
Summary
| CVE | CVE-2023-45670 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-30 23:15:00 UTC |
| Updated | 2023-11-08 19:17:00 UTC |
| Description | Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, the `config/save` and `config/set` endpoints of Frigate do not implement any CSRF protection. This makes it possible for a request sourced from another site to update the configuration of the Frigate server (e.g. via "drive-by" attack). Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. This issue can lead to arbitrary configuration updates for the Frigate server, resulting in denial of service and possible data exfiltration. Version 0.13.0 Beta 3 contains a patch. |
Risk And Classification
Problem Types: CWE-352
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/blakeblackshear/frigate/blob/5658e5a4cc7376504af9de5e1eff1789... | MISC | github.com | |
| github.com/blakeblackshear/frigate/blob/6aedc39a9a421cf48000a727f36b4c14... | MISC | github.com | |
| 0.13.0 Beta 3 · blakeblackshear/frigate · Discussion #8366 · GitHub | MISC | github.com | |
| Cross-site request forgery in `config_save` and `config_set` request handlers (GHSL-2023-198) · Advisory · blakeblackshear/frigate · GitHub | MISC | github.com | |
| Why are developers so vulnerable to drive-by attacks? | GitLab | MISC | about.gitlab.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.