Vulnerability CVE-2015-2878


Published: 2017-10-23   Modified: 2017-10-24

Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in Hexis HawkEye G 3.0.1.4912 allow remote attackers to hijack the authentication of administrators for requests that (1) add arbitrary accounts via the name parameter to interface/rest/accounts/json; turn off the (2) Url matching, (3) DNS Inject, or (4) IP Redirect Sensor in a request to interface/rest/dpi/setEnabled/1; or (5) perform whitelisting of malware MD5 hash IDs via the id parameter to interface/rest/md5-threats/whitelist.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Hawkeye-G 3.0.1.4912 Cross Site Request Forgery
John Page ( hyp3...
26.07.2015

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Watchguard -> Hawkeye g 

 References:
http://www.securityfocus.com/archive/1/536074/100/0/threaded
http://www.securityfocus.com/archive/1/536076/100/0/threaded
https://www.exploit-db.com/exploits/37686/

Copyright 2024, cxsecurity.com

 

Back to Top