Description
Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.
Remediation
References
https://nodesecurity.io/advisories/91
Related Vulnerabilities
CVE-2018-1114 Vulnerability in maven package io.undertow:undertow-core
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-common
CVE-2017-16003 Vulnerability in npm package windows-build-tools
CVE-2020-12265 Vulnerability in maven package org.webjars:decompress-tar
CVE-2021-25924 Vulnerability in maven package cd.go.plugin:go-plugin-api