Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11142: CWE-352 Cross-Site Request Forgery (CSRF) in Gosoft Software Proticaret E-Commerce

0
High
VulnerabilityCVE-2024-11142cvecve-2024-11142cwe-352
Published: Fri May 02 2025 (05/02/2025, 07:47:30 UTC)
Source: CVE
Vendor/Project: Gosoft Software
Product: Proticaret E-Commerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Gosoft Software Proticaret E-Commerce allows Cross Site Request Forgery.This issue affects Proticaret E-Commerce: before v6.0 NOTE: According to the vendor, fixing process is still ongoing for v4.05.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:53:29 UTC

Technical Analysis

CVE-2024-11142 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Gosoft Software's Proticaret E-Commerce platform, specifically versions prior to v6.0, including version 4.05. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the vulnerability enables attackers to perform unauthorized state-changing operations on the Proticaret E-Commerce platform without the user's consent or knowledge. Given the nature of e-commerce platforms, such unauthorized actions could include modifying product listings, changing prices, altering user account details, or manipulating order information. The CVSS v3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, no privileges required, but requiring user interaction. The vulnerability is exploitable remotely without authentication, but requires the victim to interact with a maliciously crafted request, such as clicking a link or visiting a malicious website while logged into the affected platform. The vendor has acknowledged the issue and is in the process of fixing it for version 4.05, but no patches are currently available. No known exploits are reported in the wild yet. The vulnerability is classified under CWE-352, which is a common and well-understood web security issue related to insufficient anti-CSRF protections such as missing or ineffective CSRF tokens or validation mechanisms.

Potential Impact

For European organizations using Proticaret E-Commerce, this vulnerability poses significant risks. Attackers could exploit CSRF to perform unauthorized transactions, manipulate product or pricing data, or compromise user accounts, leading to financial losses, reputational damage, and potential regulatory non-compliance under GDPR due to unauthorized data manipulation or exposure. The integrity and availability of the e-commerce platform could be severely impacted, disrupting business operations and customer trust. Since the vulnerability does not require authentication, attackers can target any user currently logged into the platform, increasing the attack surface. This is particularly concerning for SMEs and online retailers in Europe relying on Proticaret E-Commerce for their sales channels. Additionally, the lack of an available patch means organizations must rely on interim mitigations, increasing operational risk until a fix is released.

Mitigation Recommendations

European organizations should implement immediate compensating controls to mitigate the risk of CSRF exploitation. These include: 1) Enforcing strict Content Security Policy (CSP) headers to reduce the risk of malicious cross-site requests; 2) Implementing SameSite cookie attributes (preferably 'Strict' or 'Lax') to limit cookie transmission in cross-origin requests; 3) Monitoring and restricting referrer headers to detect suspicious requests; 4) Educating users to avoid clicking on untrusted links while logged into the platform; 5) Applying web application firewalls (WAF) with custom rules to detect and block CSRF attack patterns; 6) Conducting thorough security reviews of all state-changing endpoints to ensure they require valid anti-CSRF tokens or equivalent protections; 7) Isolating administrative interfaces and enforcing multi-factor authentication to reduce risk exposure; 8) Preparing for rapid patch deployment once the vendor releases an official fix. Organizations should also audit logs for unusual activity indicative of CSRF exploitation attempts and consider temporary disabling or restricting high-risk functionalities until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-11-12T13:50:12.494Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec1d0

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 10/5/2025, 12:53:29 AM

Last updated: 10/7/2025, 1:46:45 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats