Vulnerability CVE-2018-6651


Published: 2018-02-05

Description:
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Uncurl project -> Uncurl 
Parsecgaming -> Parsec 

 References:
https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7
https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769
https://github.com/chrisd1100/uncurl/releases/tag/0.07

Copyright 2024, cxsecurity.com

 

Back to Top