From 600f1e5d2f68b696b17a1075855f761a95b75afa Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 28 Jun 2022 15:12:50 -0400 Subject: [PATCH] Enhancement: cves/2020/CVE-2020-5776.yaml by mp --- cves/2020/CVE-2020-5776.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index 3189501127..8cf0dba03a 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -4,7 +4,7 @@ info: name: MAGMI - Cross-Site Request Forgery author: dwisiswant0 severity: high - description: MAGMI (Magento Mass Importer) is vulnerable to cross-site request forgery (CSRF) due to the lack of CSRF tokens. Remote code execution (via phpcli command) is also possible in the event that CSRF is leveraged against an existing admin session. + description: MAGMI (Magento Mass Importer) is vulnerable to cross-site request forgery (CSRF) due to a lack of CSRF tokens. Remote code execution (via phpcli command) is also possible in the event that CSRF is leveraged against an existing admin session. reference: - https://www.tenable.com/security/research/tra-2020-51 - https://nvd.nist.gov/vuln/detail/CVE-2020-5776