CVE-2023-46375

8.8 HIGH

📋 TL;DR

ZenTao Biz version 4.1.3 and earlier contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to trick authenticated users into performing unintended actions. This affects all users with access to the vulnerable ZenTao Biz instances, potentially leading to unauthorized changes to system settings or data manipulation.

💻 Affected Systems

Products:
  • ZenTao Biz
Versions: 4.1.3 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the web application layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could perform administrative actions like creating new admin accounts, modifying project data, or changing system configurations without the victim's knowledge.

🟠

Likely Case

Attackers could trick users into changing their own passwords, modifying project settings, or altering task assignments within the system.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is significantly reduced to minimal impact on system integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require the victim to be authenticated and visit a malicious page. The exploit is straightforward once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.4 or later

Vendor Advisory: https://www.zentao.net/

Restart Required: Yes

Instructions:

1. Backup your current installation and database. 2. Download the latest version from the official ZenTao website. 3. Follow the upgrade instructions provided by ZenTao. 4. Verify the installation after upgrade.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all state-changing forms and endpoints

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax attributes on session cookies

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate users about the risks of clicking unknown links while authenticated

🔍 How to Verify

Check if Vulnerable:

Check if your ZenTao Biz version is 4.1.3 or earlier by logging into the admin panel and viewing the version information.

Check Version:

Check the version in the ZenTao admin interface or look for version information in the application files.

Verify Fix Applied:

After upgrading, verify the version is 4.1.4 or later and test that CSRF tokens are being generated and validated on form submissions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same IP without proper referrer headers
  • Unusual administrative actions from non-admin users

Network Indicators:

  • Requests to ZenTao endpoints without proper CSRF tokens
  • Cross-origin requests to state-changing endpoints

SIEM Query:

source="zentao" AND (action="create" OR action="modify" OR action="delete") AND NOT referrer CONTAINS "zentao"

🔗 References

📤 Share & Export