Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51382: n/a

0
High
VulnerabilityCVE-2024-51382cvecve-2024-51382
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-Site Request Forgery (CSRF) vulnerability in JATOS v3.9.3 allows an attacker to reset the administrator's password. This critical security flaw can result in unauthorized access to the platform, enabling attackers to hijack admin accounts and compromise the integrity and security of the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:56:46 UTC

Technical Analysis

CVE-2024-51382 identifies a Cross-Site Request Forgery (CSRF) vulnerability in JATOS version 3.9.3, a platform widely used for running online behavioral experiments. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application without their consent. In this case, the vulnerability allows an attacker to reset the administrator's password by exploiting the lack of proper CSRF protections on the password reset functionality. The attack requires the victim to be an authenticated administrator who interacts with a maliciously crafted webpage or link. Upon successful exploitation, the attacker gains unauthorized administrative access, enabling them to hijack the admin account and potentially manipulate or disrupt the system. The vulnerability is rated with a CVSS 3.1 score of 8.4, indicating high severity due to its impact on confidentiality, integrity, and availability. The attack vector is network-based with low attack complexity, but it requires high privileges and user interaction. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly. The CWE classification CWE-352 confirms the nature of the CSRF issue. Given the critical role of admin accounts in managing system security and data integrity, this vulnerability poses a significant risk to organizations relying on JATOS for research or data collection.

Potential Impact

The exploitation of this CSRF vulnerability can lead to unauthorized administrative access, allowing attackers to reset the admin password and take full control over the JATOS platform. This compromises the confidentiality of sensitive research data and participant information, undermines the integrity of experimental results, and threatens the availability of the service through potential sabotage or data deletion. Organizations worldwide that use JATOS for behavioral experiments or data collection may face operational disruptions, reputational damage, and regulatory compliance issues, especially if sensitive personal data is involved. The attack requires user interaction but can be executed remotely over the network, increasing the risk of widespread exploitation. The compromise of administrator accounts can also serve as a foothold for further lateral movement within organizational networks, amplifying the overall security impact.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement CSRF protections on all sensitive actions, especially password reset functions. This includes using anti-CSRF tokens that are validated on the server side for every state-changing request. Enforcing multi-factor authentication (MFA) for administrator accounts can significantly reduce the risk of account takeover even if the password is reset. Administrators should be trained to avoid clicking on suspicious links or visiting untrusted websites while logged into the JATOS platform. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block CSRF attack patterns. Regular monitoring and auditing of password reset logs and administrative activities can help detect potential exploitation attempts early. If patches become available, they should be applied promptly. Additionally, isolating the JATOS environment and limiting admin access to trusted IP addresses can reduce exposure. Finally, organizations should maintain up-to-date backups to recover from potential data loss or sabotage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb1b7ef31ef0b55a253

Added to database: 2/25/2026, 9:37:53 PM

Last enriched: 2/28/2026, 2:56:46 AM

Last updated: 4/11/2026, 7:05:09 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses