Cross-Site Request Forgery (CSRF) is an attack that enables a malicious actor to execute unwanted actions. Before SquaredUp version 4.6, CSRF protection was not present for API endpoints.
This could be exploited by sending a SquaredUp user a link to a malicious site or implementing a forged request in a SquaredUp dashboard. When the malicious page is opened by the user, the request would be made to the SquaredUp API using the victim's session. For example, the malicious HTML code could make a successful request to add or remove users from the Named User list or upload a malicious SVG image (see CVE-2020-9390 - Stored cross-site scripting).
Since SquaredUp version 4.6, this vulnerability has been fixed. All requests are now validated using an appropriate token.
What should you do?
If you are using a SquaredUp version earlier than 4.6, update to version 4.6 or later.
Affected and resolved software versions
|Product||Affected versions||Resolved versions|
|SquaredUp for SCOM||Versions earlier than 4.6||4.6 and later versions|
|SquaredUp for Azure||Versions earlier than 4.6||4.6 and later versions|
SquaredUp would like to thank Giuseppe-Diego Gianni from NATO for reporting this vulnerability.
Did you notice a vulnerability or need further help?
Please contact our support team if you have any questions about this vulnerability or need further help: firstname.lastname@example.org
If you believe you've found a different security vulnerability in one of our products please report it by emailing our support team so we can work on fixing it: email@example.com
Revision history of this article