CVE-2023-47655: CWE-352 Cross-Site Request Forgery (CSRF) in Marco Milesi ANAC XML Bandi di Gara
Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi ANAC XML Bandi di Gara.This issue affects ANAC XML Bandi di Gara: from n/a through 7.5.
AI Analysis
Technical Summary
CVE-2023-47655 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the software product ANAC XML Bandi di Gara developed by Marco Milesi. This vulnerability affects versions up to 7.5, although the exact starting affected version is unspecified. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application in which the user is currently authenticated, thereby performing unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to induce a user to perform state-changing operations in the ANAC XML Bandi di Gara application without proper authorization checks or anti-CSRF tokens. The CVSS 3.1 base score for this vulnerability is 5.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges and requires user interaction (such as clicking a malicious link). The impact affects integrity and availability but not confidentiality, meaning that an attacker can cause unauthorized modifications or disruptions but cannot directly access sensitive data. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability is categorized under CWE-352, which specifically relates to CSRF issues. Given the nature of the product, which is related to ANAC (Italian National Anti-Corruption Authority) XML Bandi di Gara (public procurement tenders), the software likely manages or processes public procurement data or tender documentation in XML format, making it a critical tool for public sector transparency and procurement processes.
Potential Impact
For European organizations, particularly public sector bodies and entities involved in public procurement processes, this vulnerability poses a risk of unauthorized actions being performed within the ANAC XML Bandi di Gara application. Although confidentiality is not directly impacted, the integrity and availability of procurement data and tender processes could be compromised. An attacker exploiting this vulnerability could manipulate tender submissions, alter procurement data, or disrupt the availability of the service, potentially leading to procurement fraud, loss of trust, or operational delays. Given the importance of transparent and secure public procurement in the EU, exploitation could undermine regulatory compliance and damage reputations. Furthermore, since the software is tied to ANAC, which is an Italian authority, organizations in Italy using this software are at particular risk. However, if the software is used by other European public entities or contractors, the impact could extend beyond Italy. The requirement for user interaction limits the ease of exploitation but does not eliminate the risk, especially in environments where users may be targeted via phishing or social engineering campaigns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Apply any available patches or updates from the vendor as soon as they are released. Since no patch links are currently available, maintain close monitoring of vendor communications. 2) Implement or enforce anti-CSRF tokens in all state-changing requests within the ANAC XML Bandi di Gara application to ensure that requests are legitimate and originate from authorized users. 3) Employ strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks via cross-origin requests. 4) Educate users on the risks of phishing and social engineering attacks that could trick them into clicking malicious links, emphasizing caution with unsolicited emails or links related to procurement activities. 5) Monitor application logs for unusual or unauthorized actions that could indicate attempted exploitation. 6) Where possible, restrict access to the application to trusted networks or VPNs to reduce exposure to remote attackers. 7) Conduct regular security assessments and penetration testing focused on CSRF and related web vulnerabilities in the procurement software environment.
Affected Countries
Italy, Germany, France, Spain, Belgium, Netherlands
CVE-2023-47655: CWE-352 Cross-Site Request Forgery (CSRF) in Marco Milesi ANAC XML Bandi di Gara
Description
Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi ANAC XML Bandi di Gara.This issue affects ANAC XML Bandi di Gara: from n/a through 7.5.
AI-Powered Analysis
Technical Analysis
CVE-2023-47655 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the software product ANAC XML Bandi di Gara developed by Marco Milesi. This vulnerability affects versions up to 7.5, although the exact starting affected version is unspecified. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application in which the user is currently authenticated, thereby performing unwanted actions on behalf of the user without their consent. In this case, the vulnerability allows an attacker to induce a user to perform state-changing operations in the ANAC XML Bandi di Gara application without proper authorization checks or anti-CSRF tokens. The CVSS 3.1 base score for this vulnerability is 5.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network without privileges and requires user interaction (such as clicking a malicious link). The impact affects integrity and availability but not confidentiality, meaning that an attacker can cause unauthorized modifications or disruptions but cannot directly access sensitive data. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability is categorized under CWE-352, which specifically relates to CSRF issues. Given the nature of the product, which is related to ANAC (Italian National Anti-Corruption Authority) XML Bandi di Gara (public procurement tenders), the software likely manages or processes public procurement data or tender documentation in XML format, making it a critical tool for public sector transparency and procurement processes.
Potential Impact
For European organizations, particularly public sector bodies and entities involved in public procurement processes, this vulnerability poses a risk of unauthorized actions being performed within the ANAC XML Bandi di Gara application. Although confidentiality is not directly impacted, the integrity and availability of procurement data and tender processes could be compromised. An attacker exploiting this vulnerability could manipulate tender submissions, alter procurement data, or disrupt the availability of the service, potentially leading to procurement fraud, loss of trust, or operational delays. Given the importance of transparent and secure public procurement in the EU, exploitation could undermine regulatory compliance and damage reputations. Furthermore, since the software is tied to ANAC, which is an Italian authority, organizations in Italy using this software are at particular risk. However, if the software is used by other European public entities or contractors, the impact could extend beyond Italy. The requirement for user interaction limits the ease of exploitation but does not eliminate the risk, especially in environments where users may be targeted via phishing or social engineering campaigns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Apply any available patches or updates from the vendor as soon as they are released. Since no patch links are currently available, maintain close monitoring of vendor communications. 2) Implement or enforce anti-CSRF tokens in all state-changing requests within the ANAC XML Bandi di Gara application to ensure that requests are legitimate and originate from authorized users. 3) Employ strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks via cross-origin requests. 4) Educate users on the risks of phishing and social engineering attacks that could trick them into clicking malicious links, emphasizing caution with unsolicited emails or links related to procurement activities. 5) Monitor application logs for unusual or unauthorized actions that could indicate attempted exploitation. 6) Where possible, restrict access to the application to trusted networks or VPNs to reduce exposure to remote attackers. 7) Conduct regular security assessments and penetration testing focused on CSRF and related web vulnerabilities in the procurement software environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2023-11-07T17:36:32.258Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f571b0bd07c3938a60f
Added to database: 6/10/2025, 6:54:15 PM
Last enriched: 7/11/2025, 2:47:38 AM
Last updated: 8/2/2025, 1:05:38 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.