CVE-2021-47723
BaseFortify
Publication date: 2025-12-09
Last updated on: 2026-02-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| stvs | provision | 5.5 |
| stvs | provision | 5.6 |
| stvs | provision | 5.7 |
| stvs | provision | 5.8.6 |
| stvs | provision | 5.9.0 |
| stvs | provision | 5.9.1 |
| stvs | provision | 5.9.10 |
| stvs | provision | 5.9.7 |
| stvs | provision | 5.9.9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cross-site request forgery (CSRF) in STVS ProVision 5.9.10 that allows attackers to perform actions with administrative privileges by exploiting unvalidated HTTP requests. An attacker can trick an administrator into visiting a malicious website, which then sends forged requests to the vulnerable system, enabling the attacker to create new admin users without authorization.
How can this vulnerability impact me? :
The vulnerability can allow attackers to gain administrative access to the affected system by creating new admin users without permission. This can lead to unauthorized control over the system, potential data breaches, and further exploitation of the system's resources.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring HTTP requests to the STVS ProVision web interface for suspicious POST requests to the /users/create endpoint that attempt to add new admin users without proper authorization. Since the vulnerability involves CSRF attacks exploiting unvalidated HTTP requests, inspecting web server logs for unexpected POST requests creating admin accounts may help. Specific commands are not provided in the resources. [2, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the STVS ProVision web interface to trusted users only, educating users to avoid visiting untrusted or malicious websites while authenticated, and applying any available patches or updates from the vendor. Since the vulnerability arises from lack of CSRF protections, implementing CSRF tokens or other request validation mechanisms is recommended if possible. No vendor response or patch was noted as of the advisory dates. [3, 4]