CVE-2022-019713.01.2022, 01:15phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)CSRFEnginsightSeverityHIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HAtk. VectorNETWORKAtk. ComplexityLOWPriv. RequiredNONEBase ScoreCVSS 3.xEPSS ScorePercentile: 59%VendorProductVersionphoronix-mediaphoronix_test_suite𝑥< 10.8.0𝑥= Vulnerable software versionsUbuntu ReleasesUbuntu ProductCodenamephoronix-test-suitenoblednemanticdnelunardnekineticdnejammydneimpishdnefocaldnebionicneeds-triagexenialneeds-triagetrustyignoredKnown Exploits!https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2Common Weakness EnumerationCWE-352 - Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Referenceshttps://github.com/phoronix-test-suite/phoronix-test-suite/commit/4f18296a1862fe54a4c58701a1f5ec6bd62a4d94https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/57V2CSFU5MKWKL6RJUKMXSD4PCRFTMMQ/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BU7E6OOZCXS3ZWHOQ2AR7MKM56IN2R6R/