No CSRF Validationdroppy
Affected versions of
droppy are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others.
Update to version 3.5.0 or later.
publishedAdvisory publishedMar 28th, 2016
reportedInitial report by Craig ArendtMar 28th, 2016